Open Access Open Access  Restricted Access Subscription or Fee Access

A Novel Method to Improve the Side Channel Cube Attack on Light-Weight Block Ciphers

Shahram Jamali, Erfan Aghaee Kiasaraee, Majid Rahimi, Hamed Yusefi


Side Channel Cube Attack (SCCA) is a kind of Algebraic Side Channel Attacks (ASCA). In recent years, this kind of attack is implemented on different light weight block ciphers, and it is known as the most powerful attack on these kinds of algorithms. In this paper, we investigate the SCCA on a light-weight block cipher, namely, PRESENT. In addition, we propose novel methods to reduce the data complexity of the SCCA on light-weight block ciphers. Compared to the previous SCCAs, Our proposed SCCA can recover 80 key bits of PRESENT-80 only with 26.13 chosen plaintexts. To the best of our knowledge, this is the most efficient SCCA on PERESENT-80.


Cube Attack, Light-Weight Block Cipher, Side Channel Cube Attack

Full Text:



A. Bogdanov, L.R. Knudsen, G. Leander, C.Paar, A. Poschmann, M.J.B. Robshaw, Y. Seurin, C. Vikkelsoe,” PRESENT: An Ultra-Lightweight Block Cipher”, In: Paillier, CHES 2007. LNCS, vol. 4727, pp. 450–466, 2007.

D. Wheeler, R. Needham, TEA, a Tiny Encryption Algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 363–366. Springer, Heidelberg (1995).

Wheeler, D., Needham, R.: TEA extensions (October 1997), Also Correction to XTEA (October 1998),

C. Lim, T. Korkishko, mCrypton - A Lightweight Block Cipher for Security of Low-cost RFID Tags and Sensors. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, pp. 243–258. Springer, Heidelberg (2006)

D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B. Koo, HIGHT: A New Block Cipher Suitable for Low-Resource Device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 46–59. Springer, Heidelberg (2006)

F. Standaert, G. Piret, SEA: A Scalable Encryption Algorithm for Small Embedded Applications. CARDIS 2006. LNCS, vol. 3928, pp. 222–236. Springer, Heidelberg (2006)

M. Robshaw, Searching for Compact Algorithms: cgen. In: Nguyˆen, P.Q. (ed.)VIETCRYPT 2006. LNCS, vol. 4341, pp. 37–49. Springer, Heidelberg (2006)

W. Wu, L. Zhang, LBlock: A Lightweight Block Cipher,

I. Dinur, A. Shamir, "Cube Attacks on Tweakable Black Box Polynomials",EUROCRYPT 2009, LNCS 5479, pp. 278299, 2009.

I. Dinur, A. Shamir, “Side channel cube attacks on block ciphers”, Cryptology ePrint Archive,

L. Yang, M. Wang, and S. Qiao,” Side Channel Cube Attack on PRESENT”, In Proceeding of the 8th International Conference on Cryptology and Network Security- CANS 2009,LNCS, vol. 5888, pp. 379- 391.

S.F. Abdul-Latip, M.R. Reyhanitabar, W. Susilo, J. Seberry, “Extended cubes enhancing the cube attack by extracting low-degree non-linear equations”, In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security – ASIACCS 2011, ACM Society, pp. 296–305, 2011.

X. Zhao, S. Guo, F. Zhang,T. Wang, Z. Shi, H. Liu, K. Ji,J. Huang,” Efficient Hamming weight-based side-channel cube attacks on PRESENT”, Journal of Systems and SoftwareVolume 86, Issue 3, Pages 728–743, March 2013.

X. Zhao, T. Wang, S. Guo, “ Improved side channel cube attacks on PRESENT”, Cryptology ePrint Archive,

S.F. Abdul-Latip, M.R. Reyhanitabar, W. Susilo, J. Seberry, “On the Security of NOEKEON against side channel cube attacks” In: Proceedings of the 5th InformationSecurity Practice and Experience Conference. Future Conference – ISPEC2010, LNCS, vol. 6047, pp. 45–55, 2010.

G.V. Bard, N.T. Courtois, J. Nakahara, P. Sepehrdad, B. Zhang, “Algebraic, AIDA/cube and side channel analysis of KATAN family of block ciphers”, In: Progress in Cryptology-indocryt, LNCS, vol. 6498, pp. 176–196, 2010.

X. Fan, G. Gong, “On the security of Hummingbird-2 against side channel cube attacks” In: Proceedings of WEWoRC 2011, pp. 100–104, 2011

Z. Li, B. Zhang, Y. Yao, D. Lin,” Cube Cryptanalysis of LBlock with Noisy Leakage”, Information Security and Cryptology – ICISC 2012, Lecture Notes in Computer Science Volume 7839, pp 141-155, 2013.

S. Islam, M. Afzal, A. Rashdi,” On the Security of LBlock against the Cube Attack and Side Channel Cube Attack”, Security Engineering and Intelligence Informatics, Lecture Notes in Computer Science Volume 8128, pp 105-121, 2013.

D. Klose, PRESENT implementation,, 2011.

M. Blum, M. Luby, R. Rubinfeld: Self-testing/correcting with applications to numerical problems. Journal of Computer and System Sciences 47, 549–595 (1993)


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.