In this paper, we demonstrate a new Differential Power Analysis (DPA) attack technique against Grain v1 stream cipher by resynchronizing the cipher multiple times with the same value of the secret key and different initialization vectors (IVs). Our proposed attack strategy requires less than a hundred randomly generated IVs (expected value) to retrieve the whole 80-bit key. Further, the power trace classifications of Grain v1 cipher implemented on SASEBO G-II standard side channel evaluation board is shown in order to validate our proposed DPA attack against the cipher. The captured power traces were analyzed using Least Squares Support Vector Machine (LS-SVM) learning algorithm based multiclass classifiers to classify the power traces into the respective Hamming distance (HD) classes. To extract power samples with high information about HD classes, Signal-to-noise ratio (SNR) metric was chosen for feature selection. The experiment of power trace classifications of test set showed a high success rate of 98% when the five largest SNR sample instants over a clock cycle were chosen as features.
[1]
Johan A. K. Suykens,et al.
Least Squares Support Vector Machine Classifiers
,
1999,
Neural Processing Letters.
[2]
Siva Sai Yerubandi,et al.
Differential Power Analysis
,
2002
.
[3]
Debdeep Mukhopadhyay,et al.
LFSR Based Stream Ciphers Are Vulnerable to Power Attacks
,
2007,
INDOCRYPT.
[4]
Martin Hell,et al.
Grain: a stream cipher for constrained environments
,
2007,
Int. J. Wirel. Mob. Comput..
[5]
Wieland Fischer,et al.
Differential Power Analysis of Stream Ciphers
,
2007,
CT-RSA.
[6]
Johan A. K. Suykens,et al.
LS-SVMlab Toolbox User's Guide version 1.7
,
2003
.
[7]
Abdulah Abdulah Zadeh,et al.
Simple power analysis applied to nonlinear feedback shift registers
,
2014,
IET Inf. Secur..
[8]
Ilan Adler,et al.
The coupon subset collection problem
,
2001,
Journal of Applied Probability.
[9]
Stefan Mangard,et al.
Power analysis attacks - revealing the secrets of smart cards
,
2007
.