Side-Channel Attack on ARADI in Non-Profiling Scenarios

ARADI is a low-latency block cipher introduced by the NSA (National Security Agency), designed with consideration for applications in memory encryption. In this study, we present the first results of side-channel attacks on ARADI, exposing its vulnerabilities to physical attacks in a non-profiling s...

Full description

Saved in:
Bibliographic Details
Main Authors: Donggeun Kwon, Seokhie Hong
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/11071292/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:ARADI is a low-latency block cipher introduced by the NSA (National Security Agency), designed with consideration for applications in memory encryption. In this study, we present the first results of side-channel attacks on ARADI, exposing its vulnerabilities to physical attacks in a non-profiling scenario. We propose a novel bitwise divide-and-conquer methodology tailored for ARADI, and extend the approach to recover the full 256-bit master key. Using power consumption traces from an ARM processor, our experimental results demonstrate the effectiveness of our attack method, achieving key recovery with only 2,000 traces. These findings highlight critical weaknesses in the physical security of ARADI and emphasize the need for robust countermeasures to address side-channel vulnerabilities without compromising performance. This research provides new insights into the practical security of ARADI, underscoring the importance of integrating physical attack resilience in cryptographic designs.
ISSN:2169-3536