Publication Type:

Conference Paper

Source:

Proceedings - 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010, Volume 9, Chengdu, p.667-671 (2010)

ISBN:

9781424455386

URL:

http://www.scopus.com/inward/record.url?eid=2-s2.0-77958611333&partnerID=40&md5=a245a52aea5229b26a17ba8bbae3131b

Keywords:

Computer hardware description languages, Computer science, Cryptographic processor, Cryptography, Differential power Analysis, Differential power analysis attack, FPGA, FPGA implementations, Hardware, Hardware implementations, Hydraulics, Information technology, Irregular clocking, Key stream generator, MICKEY 128, Physical measurement, Secret information, Side channel attack, Signal analysis, Spartan-3, Stream Ciphers

Abstract:

The MICKEY 128 (Mutual Irregular Clocking KEY stream generator with a 128-bit key) is a stream cipher designed in response to the ECRYPT 'Call for Stream Cipher Primitives' in 2005. For many applications, these implementations need to be resistant against side channel attacks, means; it should not be too easy to extract secret information from physical measurements on the device. This paper presents the results of differential power analysis attack against MICKEY 128 stream cipher hardware implementation. Our attack is targeted against an FPGA implementation of the MICKEY 128 on SPARTAN 3E. © 2010 IEEE.

Notes:

cited By (since 1996)0; Conference of org.apache.xalan.xsltc.dom.DOMAdapter@474471c6 ; Conference Date: org.apache.xalan.xsltc.dom.DOMAdapter@5e89a2b7 Through org.apache.xalan.xsltc.dom.DOMAdapter@1e19ccde; Conference Code:81988

Cite this Research Publication

S. Sandeep and Rajesh, C. B., “Differential power analysis on FPGA implementation of MICKEY 128”, in Proceedings - 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010, Chengdu, 2010, vol. 9, pp. 667-671.