Browse > Article
http://dx.doi.org/10.9723/jksiis.2012.17.6.011

Side-Channel Cryptanalysis on Stream Cipher HC-128 for Mobile Ad-Hoc Network Environments  

Bae, KiSeok (경북대학교 전자전기컴퓨터학과)
Park, YoungHo (경북대학교 산업전자공학과)
Moon, SangJae (경북대학교 IT대학 전자공학부)
Publication Information
Journal of Korea Society of Industrial Information Systems / v.17, no.6, 2012 , pp. 11-17 More about this Journal
Abstract
The HC-128 stram cipher which selected for the final eSTREAM portfolio is suitable for mobile Ad-Hoc network environments because of the ability of high-speed encryption in restricted memory space. In this paper, we analyzed the vulnerability of side channel analysis attack on HC-128 stream cipher. At the first, we explain a flaw of previous theoretical analysis result which defined the complexity of side-channel attack of HC-128 stream cipher as 'low' and then re-evaluate the security against side-channel attack by estimating the concrete complexity for recovering the secret key. As a result, HC-128 stream cipher is relatively secure against side-channel attack since recovering the secret key have $2^{65}$ computation complexity which is higher than other stream cipher's one.
Keywords
HC-128 stream cipher; Side Channel Cryptanalysis; Mobile Ad-Hoc Network;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Feng, Zhao, and Leonidas Guibas, "Wireless Sensor Networks," Elsevier, 2004.
2 김시관, 신윤식, 임은기, "이동 임시 무선망에서의 키관리 기법에 관한 연구," 한국산업정보학회논문지 Vol. 9, No. 4, pp.90-98, 2004.
3 P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," Advances in Cryptology, Proc.Crypto' 99, pp.388-397, 1999.
4 B. Gierlichs, L. Batina, C. Clavier, T. Eisenbarth, A. Gouget, Helena H, T. Kasper, K .Lemkerust, S. Mangard, A. Moradi and E. Oswald, "Susceptible of eSTREAM Candidates towards Side Channel Analysis," Proc.SASC 2008 - Candidate of the Art of Stream Ciphers, 2008.
5 박준철, "HC-256 스트림 암호화를 이용한 범용성 및 확장성을 가진 DRM 기법 설계," 한국통신학회논문지, Vol. 32, No. 9, pp. 923-930, 2009.
6 H. Wu, "The Stream Cipher HC-128," Proc.New Stream Cipher Desings, pp.39-47, 2008.
7 Natioanl Institute of Standars and Technology, "Secure Hash Standard (SHS)," FIPS PUB 180-4, 2012.
8 이훈재, 최희봉, 이상곤, "블록 형태 암호에서의 DPA 방어기술 연구," 한국산업정보학회논문지, Vol. 7, No. 4, pp.1-8, 2002.   과학기술학회마을
9 C. Rechberger, E. Oswald, "Stream Ciphers and Side Channel analysis," In Proceedings of SASC 2004 - The State of the Art of Stream Ciphers 2004, pp.320-326, 2004.
10 Keke Wu, Huiyun Li, Bo Peng, and Fengqi Yu,, "Correlation Power Analysis Attack against Synchronous Stream Ciphers," Proc.ICYCS'08, pp.2067-2072, 2008.
11 배기석, 안만기, 박제훈, 이훈재, 문상재, "스트림 암호 Rabbit에 대한 전력분석 공격," 정보보호학회논문지, Vol. 21, No. 3, pp. 27-36, 2011.   과학기술학회마을
12 K. S. Bae, M. K. Ahn, H. J. Lee, S. J. Moon, "Practical Side Channel Analysis Attacks on the Stream Cipher Salsa20/12," In Proceedings of ITC-CSCC 2011, pp. 835-838, 2011.
13 J. Lano, N. Mentens, B. Prenell and I. Verbauwhede, "Power Analysis of Synchronous Stream Ciphers with Resynchronization Mechanism," The State of the Art of Stream Cipher, Proc. SASC'04, pp.327-333, 2004.