Side Channel Analysis of International Data Encryption Algorithm (IDEA)

Document Type : Original Article

Authors

-

Abstract

The International Data Encryption Algorithm (IDEA)is a symmetric block Cipher with 64 block size and a 128-bit secret key. This algorithm maps a 64-bits plaintext into 64-bits ciphertext in 8.5 encryption rounds. This algorithm has so far been resistant against most known attacks.  In this paper, the resistance of IDEA algorithm against correlation power side channel attack is evaluated. By implementing this algorithm on PIC micro controller platform, several samples of power consumption were measured during processing. The results of analyzing the measured samples indicate the resistance of the algorithm to the correlation power side channel analysis.

Keywords


[1]     S. Vaudenay, “On the Lai-Massey Scheme,” ASIACRYPT, vol. 1716, 1999.##
[2]     H. K. Verma, A. Kumar, and K. Sharma, “Study and Performance Analysis of IDEA with Variable Rounds,” International Journal of Advanced Research in Compute Science and Software Engineering, vol. 02, no. 05, 2012.##
[3]     A. Malekian, “Security of Datas,” Nas, 2015.##
[4]     A. Selcuk and E. Ayaz, “Improved DST Cryptanalysis of IDEA,” Lecture Notes in Computer Science (LNCS), vol. 4356, 2006.##
[5]     O. Dunkelman, N. Keller, and E. Biham, “New cryptanalytic results on IDEA,” Lecture Notes in Computer Science (LNCS), vol. 4284, pp. 412–427, 2006.##
[6]     O. Dunkelman, N. Keller, and E. Biham, “A new attack on 6-round IDEA,” in FSE, 2007.##
[7]     X. Lia and X. Sun, “The key-dependent attack on block ciphers,” in ASIACRYPT, 2009.##
[8]     O. Dunkelman, N. Keller, A. Shamir, and E. Biham, “New Attacks on IDEA with at Least 6 Rounds,” Cryptology, pp. 209-239, 2013.##
[9]     J. Kelsey, B. Schneier, D. Wagner, and C. Hall,  “Side Channel Cryptanalysis of Product Ciphers,” Journal of Computer Security, vol. 8, no. 2-3, pp. 141-158, 2000.##
[10]  S. Bandyopadhyay and K. Das, “Analysis of Side Channel Attacks on Various Cryptographic Algorithms,” Journal for Research, vol. 2, no. 5, pp. 36-41, 2016.##
[11]  Francois Koeune, and Francois-Xavier Standaert, “A Tutorial on Physical Security and Side-Channel Attacks,” LNCS, vol. 3655, 2005.##
  • Receive Date: 12 February 2019
  • Revise Date: 20 April 2019
  • Accept Date: 18 June 2019
  • Publish Date: 20 February 2020