@inproceedings{280f77d9c3d54a2190cc6e83e4dff2b3,
title = "Consecutive S-box lookups: A timing attack on SNOW 3G",
abstract = "We present a cache-timing attack on the SNOW 3G stream cipher. The attack has extremely low complexity and we show it is capable of recovering the full cipher state from empirical timing data in a matter of seconds, requiring no known keystream and only observation of a small number of cipher clocks. The attack exploits the cipher using the output from an S-box as input to another S-box: we show that the corresponding cache-timing data almost uniquely determines said S-box input. We mention other ciphers with similar structure where this attack applies, such as the K2 cipher currently under standardization consideration by ISO. Our results yield new insights into the secure design and implementation of ciphers with respect to side-channels. We also give results of a bit-slice implementation as a countermeasure.",
keywords = "cache-timing attacks, side-channel attacks, stream ciphers",
author = "Brumley, {Billy Bob} and Hakala, {Risto M.} and Kaisa Nyberg and Sampo Sovio",
year = "2010",
month = dec,
day = "1",
doi = "10.1007/978-3-642-17650-0_13",
language = "English",
isbn = "3642176496",
series = "Lecture Notes in Computer Science",
pages = "171--185",
booktitle = "Information and Communications Security - 12th International Conference, ICICS 2010, Proceedings",
note = "2010 International Conference on Information and Communications Security, ICICS 2010 ; Conference date: 15-12-2010 Through 17-12-2010",
}