JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Side-Channel Cryptanalysis on Stream Cipher HC-128 for Mobile Ad-Hoc Network Environments
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Side-Channel Cryptanalysis on Stream Cipher HC-128 for Mobile Ad-Hoc Network Environments
Bae, KiSeok ; Park, YoungHo ; Moon, SangJae ;
  PDF(new window)
 Abstract
The HC-128 stram cipher which selected for the final eSTREAM portfolio is suitable for mobile Ad-Hoc network environments because of the ability of high-speed encryption in restricted memory space. In this paper, we analyzed the vulnerability of side channel analysis attack on HC-128 stream cipher. At the first, we explain a flaw of previous theoretical analysis result which defined the complexity of side-channel attack of HC-128 stream cipher as 'low' and then re-evaluate the security against side-channel attack by estimating the concrete complexity for recovering the secret key. As a result, HC-128 stream cipher is relatively secure against side-channel attack since recovering the secret key have computation complexity which is higher than other stream cipher's one.
 Keywords
HC-128 stream cipher . Side Channel Cryptanalysis . Mobile Ad-Hoc Network
 Language
Korean
 Cited by
 References
1.
Feng, Zhao, and Leonidas Guibas, "Wireless Sensor Networks," Elsevier, 2004.

2.
김시관, 신윤식, 임은기, "이동 임시 무선망에서의 키관리 기법에 관한 연구," 한국산업정보학회논문지 Vol. 9, No. 4, pp.90-98, 2004.

3.
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," Advances in Cryptology, Proc.Crypto' 99, pp.388-397, 1999.

4.
B. Gierlichs, L. Batina, C. Clavier, T. Eisenbarth, A. Gouget, Helena H, T. Kasper, K .Lemkerust, S. Mangard, A. Moradi and E. Oswald, "Susceptible of eSTREAM Candidates towards Side Channel Analysis," Proc.SASC 2008 - Candidate of the Art of Stream Ciphers, 2008.

5.
박준철, "HC-256 스트림 암호화를 이용한 범용성 및 확장성을 가진 DRM 기법 설계," 한국통신학회논문지, Vol. 32, No. 9, pp. 923-930, 2009.

6.
H. Wu, "The Stream Cipher HC-128," Proc.New Stream Cipher Desings, pp.39-47, 2008.

7.
Natioanl Institute of Standars and Technology, "Secure Hash Standard (SHS)," FIPS PUB 180-4, 2012.

8.
이훈재, 최희봉, 이상곤, "블록 형태 암호에서의 DPA 방어기술 연구," 한국산업정보학회논문지, Vol. 7, No. 4, pp.1-8, 2002.

9.
C. Rechberger, E. Oswald, "Stream Ciphers and Side Channel analysis," In Proceedings of SASC 2004 - The State of the Art of Stream Ciphers 2004, pp.320-326, 2004.

10.
Keke Wu, Huiyun Li, Bo Peng, and Fengqi Yu,, "Correlation Power Analysis Attack against Synchronous Stream Ciphers," Proc.ICYCS'08, pp.2067-2072, 2008.

11.
배기석, 안만기, 박제훈, 이훈재, 문상재, "스트림 암호 Rabbit에 대한 전력분석 공격," 정보보호학회논문지, Vol. 21, No. 3, pp. 27-36, 2011.

12.
K. S. Bae, M. K. Ahn, H. J. Lee, S. J. Moon, "Practical Side Channel Analysis Attacks on the Stream Cipher Salsa20/12," In Proceedings of ITC-CSCC 2011, pp. 835-838, 2011.

13.
J. Lano, N. Mentens, B. Prenell and I. Verbauwhede, "Power Analysis of Synchronous Stream Ciphers with Resynchronization Mechanism," The State of the Art of Stream Cipher, Proc. SASC'04, pp.327-333, 2004.

 Related Articles