Iterative side-channel cube attack on KeeLoq
KeeLoq is a 528-round lightweight block cipher which has a 64-bit secret key and a 32-bit block length.The cube attack,proposed by Dinur and Shamir,is a new type of attacking method.In this paper,we investigate the security of KeeLoq against iterative side-channel cube attack which is an enhanced attack scheme.Based on structure of typical block ciphers,we give the model of iterative side-channel cube attack.Using the traditional single-bit leakage model,we assume that the attacker can exactly possess the information of one bit leakage after round 23.The new attack model costs a data complexity of 211.00 chosen plaintexts to recover the 23-bit key of KeeLoq.Our attack will reduce the key searching space to 241 by considering an error-free bit from internal states.
KeeLoq cube attack block cipher algebraic attack side-channel attack iterative attack leakage model
Yunfei Ma Tao Wang Hao Chen Dong Lei
Department of Information Engineering Ordnance Engineering College Shijiazhuang 050003, China
国际会议
哈尔滨
英文
53-56
2016-07-21(万方平台首次上网日期,不代表论文的发表时间)