By Topic

Correlation Power Analysis Attack against Synchronous Stream Ciphers

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Keke Wu ; Dept. of Integrated Electron., Shenzhen Inst. of Adv. Technol., Shenzhen ; Huiyun Li ; Bo Peng ; Fengqi Yu

Power analysis attacks as side channel analysis techniques of cryptographic devices have been mounted against block ciphers and public key but rarely against stream ciphers. There are no reports on correlation power analysis (CPA) attack against stream ciphers so far. This paper proposes a novel CPA against synchronous stream ciphers. Then we present two experiments of CPA attacks on stream ciphers A5/1 and E0. The experimental results indicate that CPA of synchronous stream ciphers is feasible.

Published in:

Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for

Date of Conference:

18-21 Nov. 2008