Fibonacci LFSR vs. Galois LFSR: Which is More Vulnerable to Power Attacks?

Linear Feedback Shift Registers (LFSRs) with primitive connection polynomials as feedback functions are used as primary components of many stream ciphers and other cryptosystems. The motivation of our work is to demonstrate that though hardware implementation of Galois LFSR offers higher throughput than its Fibonacci counterpart, the former could be more susceptible to power analysis attacks. This gains more importance with the fact that both the LFSR configurations are theoretically equivalent. We propose a new attack strategy that deduces the initial state of a Galois LFSR by determining the LFSR output stream from the difference of power dissipation values in consecutive clock cycles. In addition, experimental results on power traces of both configurations implemented on SASEBO-GII board show that LFSR output stream retrieval from power dissipation values in Galois LFSR involve much less error in bit sequences compared to its Fibonacci counterpart.

[1]  Antoine Joux,et al.  Galois LFSR, Embedded Devices and Side Channel Weaknesses , 2006, INDOCRYPT.

[2]  Martin Hell,et al.  Grain: a stream cipher for constrained environments , 2007, Int. J. Wirel. Mob. Comput..

[3]  Christof Paar,et al.  Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.

[4]  Abdulah Abdulah Zadeh,et al.  Simple power analysis applied to nonlinear feedback shift registers , 2014, IET Inf. Secur..

[5]  Stefan Mangard,et al.  Power analysis attacks - revealing the secrets of smart cards , 2007 .

[6]  Francis Olivier,et al.  Electromagnetic Analysis: Concrete Results , 2001, CHES.

[7]  Pankaj Rohatgi,et al.  Template Attacks , 2002, CHES.

[8]  Neal Koblitz,et al.  Advances in Cryptology — CRYPTO ’96 , 2001, Lecture Notes in Computer Science.

[9]  C. Pandu Rangan,et al.  Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings , 2007, INDOCRYPT.

[10]  Debdeep Mukhopadhyay,et al.  LFSR Based Stream Ciphers Are Vulnerable to Power Attacks , 2007, INDOCRYPT.

[11]  Michael Wiener,et al.  Advances in Cryptology — CRYPTO’ 99 , 1999 .

[12]  Tanja Lange,et al.  Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings , 2006, INDOCRYPT.

[13]  Elena Dubrova,et al.  A Transformation From the Fibonacci to the Galois NLFSRs , 2009, IEEE Transactions on Information Theory.

[14]  James L. Massey,et al.  Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.

[15]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[16]  David Naccache,et al.  Cryptographic Hardware and Embedded Systems — CHES 2001 , 2001 .

[17]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.