Abstract
The National Institute of Standard and Technology (NIST) has recently started a competition with the objective to standardize lightweight cryptography (LWC). The winning schemes will be deployed in Internet-of-Things (IoT) devices, a key step for the current and future information and communication technology market. GIFT is an efficient lightweight cipher and it is used by one-fourth of the LWC candidates in the NIST LWC competition. Thus, its security evaluation is critical. One vital threat to the security are so-called logical side-channel attacks based on cache observations. In this work, we propose a novel cache attack on GIFT referred to as GRINCH. We analyzed the vulnerabilities of GIFT and exploited them in our attack. The results show that the attack is effective and that the full key could be recovered with less than 400 encryptions.
Original language | English |
---|---|
Title of host publication | 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE) |
Place of Publication | Piscataway |
Publisher | IEEE |
Pages | 549-554 |
Number of pages | 6 |
ISBN (Electronic) | 978-3-9819263-5-4 |
ISBN (Print) | 978-1-7281-6336-9 |
DOIs | |
Publication status | Published - 2021 |
Event | 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE) - Virtual, Virtual/Grenoble, France Duration: 1 Feb 2021 → 5 Feb 2021 https://www.date-conference.com/ |
Conference
Conference | 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE) |
---|---|
Abbreviated title | DATE'21 |
Country/Territory | France |
City | Virtual/Grenoble |
Period | 1/02/21 → 5/02/21 |
Internet address |
Keywords
- Lightweight cipher
- GIFT cipher
- cache attack
- Micro-architectural attack