Advanced SearchSearch Tips
Side-Channel Cryptanalysis on Stream Cipher HC-128 for Mobile Ad-Hoc Network Environments
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Side-Channel Cryptanalysis on Stream Cipher HC-128 for Mobile Ad-Hoc Network Environments
Bae, KiSeok; Park, YoungHo; Moon, SangJae;
  PDF(new window)
The HC-128 stram cipher which selected for the final eSTREAM portfolio is suitable for mobile Ad-Hoc network environments because of the ability of high-speed encryption in restricted memory space. In this paper, we analyzed the vulnerability of side channel analysis attack on HC-128 stream cipher. At the first, we explain a flaw of previous theoretical analysis result which defined the complexity of side-channel attack of HC-128 stream cipher as 'low' and then re-evaluate the security against side-channel attack by estimating the concrete complexity for recovering the secret key. As a result, HC-128 stream cipher is relatively secure against side-channel attack since recovering the secret key have computation complexity which is higher than other stream cipher's one.
HC-128 stream cipher;Side Channel Cryptanalysis;Mobile Ad-Hoc Network;
 Cited by
Feng, Zhao, and Leonidas Guibas, "Wireless Sensor Networks," Elsevier, 2004.

김시관, 신윤식, 임은기, "이동 임시 무선망에서의 키관리 기법에 관한 연구," 한국산업정보학회논문지 Vol. 9, No. 4, pp.90-98, 2004.

P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," Advances in Cryptology, Proc.Crypto' 99, pp.388-397, 1999.

B. Gierlichs, L. Batina, C. Clavier, T. Eisenbarth, A. Gouget, Helena H, T. Kasper, K .Lemkerust, S. Mangard, A. Moradi and E. Oswald, "Susceptible of eSTREAM Candidates towards Side Channel Analysis," Proc.SASC 2008 - Candidate of the Art of Stream Ciphers, 2008.

박준철, "HC-256 스트림 암호화를 이용한 범용성 및 확장성을 가진 DRM 기법 설계," 한국통신학회논문지, Vol. 32, No. 9, pp. 923-930, 2009.

H. Wu, "The Stream Cipher HC-128," Proc.New Stream Cipher Desings, pp.39-47, 2008.

Natioanl Institute of Standars and Technology, "Secure Hash Standard (SHS)," FIPS PUB 180-4, 2012.

이훈재, 최희봉, 이상곤, "블록 형태 암호에서의 DPA 방어기술 연구," 한국산업정보학회논문지, Vol. 7, No. 4, pp.1-8, 2002.

C. Rechberger, E. Oswald, "Stream Ciphers and Side Channel analysis," In Proceedings of SASC 2004 - The State of the Art of Stream Ciphers 2004, pp.320-326, 2004.

Keke Wu, Huiyun Li, Bo Peng, and Fengqi Yu,, "Correlation Power Analysis Attack against Synchronous Stream Ciphers," Proc.ICYCS'08, pp.2067-2072, 2008.

배기석, 안만기, 박제훈, 이훈재, 문상재, "스트림 암호 Rabbit에 대한 전력분석 공격," 정보보호학회논문지, Vol. 21, No. 3, pp. 27-36, 2011.

K. S. Bae, M. K. Ahn, H. J. Lee, S. J. Moon, "Practical Side Channel Analysis Attacks on the Stream Cipher Salsa20/12," In Proceedings of ITC-CSCC 2011, pp. 835-838, 2011.

J. Lano, N. Mentens, B. Prenell and I. Verbauwhede, "Power Analysis of Synchronous Stream Ciphers with Resynchronization Mechanism," The State of the Art of Stream Cipher, Proc. SASC'04, pp.327-333, 2004.