1. Power Analysis of Kuznyechik cipher on Arduino Nano board
- Author
-
Ivan Us, Vadim Girichev, and Ekaterina Maro
- Subjects
GOST (block cipher) ,Power analysis ,Computer engineering ,Cipher ,business.industry ,Computer science ,Robustness (computer science) ,Key (cryptography) ,Cryptography ,Side channel attack ,business ,Encryption - Abstract
Side-channel attacks basically use the features of software or hardware implementations of information security algorithms. An example of global side-channel attacks is an attack based on a power measurements analysis. Therefore, cryptographic algorithm implementations should be tested accordance of robustness features to side-channel attacks, such as power analysis attacks. This paper presents a power analysis traces and practical segmentations of power consumption measurements charts for encryption standard Kuznyechik cipher (GOST R 34.12 – 2015 (n = 128)) on original and modified Arduino Nano boards. Algorithms for differential power analysis of Kuznyechik cipher is developed and applied to experimental charts. Three sets of power consumption charts of various sizes (10, 100 and 1000 charts) were tested. Our experiments led to highlight chart segments of additions with round key, non-linear transformation (S) and linear transformation (L) operations for analyzed implementation of Kuznyechik cipher. The arithmetic mean of power consumption values for S-box encryption operations of Kuznyechik cipher were calculated for all key candidates and set of statistically probable key-bit values were fixed.
- Published
- 2021
- Full Text
- View/download PDF