GRINCH

A Cache Attack against GIFT Lightweight Cipher

Conference Paper (2021)
Author(s)

Cezar Reinbrecht (TU Delft - Computer Engineering)

Abdullah Aljuffri (TU Delft - Computer Engineering)

Said Hamdioui (TU Delft - Quantum & Computer Engineering)

Mottaqiallah Taouil (TU Delft - Computer Engineering)

Johanna Sepulveda (Airbus)

DOI related publication
https://doi.org/10.23919/DATE51398.2021.9474201 Final published version
More Info
expand_more
Publication Year
2021
Language
English
Article number
9474201
Pages (from-to)
549-554
Publisher
IEEE
ISBN (print)
978-1-7281-6336-9
ISBN (electronic)
978-3-9819263-5-4
Event
Downloads counter
178

Abstract

The National Institute of Standard and Technology (NIST) has recently started a competition with the objective to standardize lightweight cryptography (LWC). The winning schemes will be deployed in Internet-of-Things (IoT) devices, a key step for the current and future information and communication technology market. GIFT is an efficient lightweight cipher and it is used by one-fourth of the LWC candidates in the NIST LWC competition. Thus, its security evaluation is critical. One vital threat to the security are so-called logical side-channel attacks based on cache observations. In this work, we propose a novel cache attack on GIFT referred to as GRINCH. We analyzed the vulnerabilities of GIFT and exploited them in our attack. The results show that the attack is effective and that the full key could be recovered with less than 400 encryptions.