A Template Attack-Resistant Masking Scheme for RC4 Based on FPGA

This paper introduces RC4 stream cipher which is widely used in the TLS/SSL protocol and several weaknesses in its algorithm. In order to enhance the security of RC4, this paper proposes a new masking scheme using random number for both input key and the internal states of RC4. This improved RC4 has destroyed the foundation of many attacks on RC4, especially the template attack. The new algorithm is realized based on the SAKURA-G FPGA board, and 1000 power traces and 5000 power traces are acquired from the unmasked and masked RC4 hardware respectively with 256 different input keys. The experiment results show that the proposed masking scheme for RC4 can be effectively resistant to template attack.

[1]  Stefan Mangard,et al.  Power analysis attacks - revealing the secrets of smart cards , 2007 .

[2]  Goutam Paul,et al.  On biases of permutation and keystream bytes of RC4 towards the secret key , 2008, Cryptography and Communications.

[3]  Subhamoy Maitra,et al.  High-Performance Hardware Implementation for RC4 Stream Cipher , 2013, IEEE Transactions on Computers.

[4]  Jian Xie,et al.  An improved RC4 stream cipher , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[5]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[6]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.