Saurabh, H and Kundu, S and Titti, SS and Golder, A and Soundra Pandian, KK and Li, C and Karmakar, A and Das, D (2024) Full Key Extraction of SNOW-V Using ML-assisted Power SCA. In: IEEE Design and Test .
PDF
IEEE_Des_Tes_2024 - Published Version Restricted to Registered users only Download (4MB) | Request a copy |
Abstract
This paper proposes the first Side-Channel Analysis (SCA) attack with full key recovery on SNOW-V, a 5G mobile communication standardization candidate. Our preliminary analysis examines the SNOW-V architecture, revealing that the Linear Feedback Shift Register (LFSR) is the most susceptible point of attack. We then performed a Test Vector Leakage Assessment (TVLA) and Known-Key Correlation (KKC) to identify the leakage point. Subsequently, Correlational Power Analysis (CPA) attack is utilized to recover one key byte at a time. The correct secret key is then uniquely identified using Linear Discriminant Analysis (LDA). Additionally, we demonstrate how an incremental attack can be performed to recover all key bytes of SNOW-V. Finally, we integrated a Boolean masking countermeasure to secure SNOW-V implementation against SCA attacks. © 2013 IEEE.
Item Type: | Journal Article |
---|---|
Publication: | IEEE Design and Test |
Publisher: | IEEE Computer Society |
Additional Information: | The copyright for this article belongs to the publishers. |
Keywords: | 5G mobile communication systems; Forward error correction; Information leakage; Leak detection; Network security, Boolean masking; Countermeasure; Key recovery; Known-key correlation; Linear feedback shift register; Linear feedback shift registers; Power; Side channel analyze; Side-channel analysis; SNOW-V, Shift registers |
Department/Centre: | Division of Electrical Sciences > Electronic Systems Engineering (Formerly Centre for Electronic Design & Technology) |
Date Deposited: | 29 Jan 2025 12:06 |
Last Modified: | 29 Jan 2025 12:06 |
URI: | http://eprints.iisc.ac.in/id/eprint/87332 |
Actions (login required)
View Item |