Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sandip Karmakar is active.

Publication


Featured researches published by Sandip Karmakar.


international conference on cryptology in india | 2008

Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures

Mukesh Agrawal; Sandip Karmakar; Dhiman Saha; Debdeep Mukhopadhyay

Scan chain based attacks are a kind of side channel attack, which targets one of the most important feature of todays hardware - the test circuitry. Design for Testability (DFT) is a design technique that adds certain testability features to a hardware design. On the other hand, this very feature opens up a side channel for cryptanalysis, rendering crypto-devices vulnerable to scan-based attack. Our work studies scan attack as a general threat to stream ciphers and arrives at a general relation between the design of stream ciphers and their vulnerability to scan attack. Finally, we propose a scheme which we show to thwart the attacks and is more secure than other contemporary strategies.


international conference on progress in cryptology | 2011

Fault analysis of grain-128 by targeting NFSR

Sandip Karmakar; Dipanwita Roy Chowdhury

Fault attack is one of the most efficient form of side channel attack against implementations of cryptographic algorithms. This kind of attacks have been shown to be extremely successful against stream ciphers. The eStream cipher Grain-128 has already been shown to be weak against fault attack, when faults are injected in the LFSR. In this paper, we show that Grain-128 can also be attacked by inducing faults in the NFSR. The attack requires about 56 fault injections for NFSR and a computational complexity of about 221.


workshop on fault diagnosis and tolerance in cryptography | 2013

Differential Fault Analysis of MICKEY-128 2.0

Sandip Karmakar; Dipanwita Roy Chowdhury

This paper presents a differential fault analysis of the MICKEY-128 2.0 stream cipher, one of the finalist of eStream project. The current attack works on MICKEY-128 2.0 with 320 state register-bits and requires 480 number of random single bit faults to break it. Till date, only two fault attacks against MICKEY family are available in literature, one attack on MICKEY-128 and another on MICKEY 2.0. The attack on MICKEY-128 with same 320 register bits required 640 number of faults whereas the other attack on MICKEY 2.0 with 200 state register bits required


cellular automata for research and industry | 2010

d-monomial tests of nonlinear cellular automata for cryptographic design

Sandip Karmakar; Debdeep Mukhopadhyay; Dipanwita Roy Chowdhury

2^{16.7} number of faults. To the best of our knowledge the current attack gives the best performance with respect to the number of faults to be induced against the highest version of MICKEY, MICKEY-128 2.0.


Cellular Automata and Discrete Complex Systems - 19th International Workshop, AUTOMATA 2013, Gießen, Germany, September 17-19, 2013. Proceedings | 2013

Leakage Squeezing Using Cellular Automata

Sandip Karmakar; Dipanwita Roy Chowdhury

Pseudorandom generation is a key to any cryptographic application. Linear Cellular Automata are known as good pseudorandom generators. However, for cryptographic applications nonlinearity is essential for its security. But, nonlinear Cellular Automaton shows high correlation between the input to the automaton and its generated sequence. Hence, for cryptography Cellular Automata rules need to be nonlinear as well as satisfy additional properties. With this motivation, in this paper, we analyze nonlinear Cellular Automata with a newly developed statistical measure called d-monomial test. Finally, we propose a process of d-monomial characteristics addition to get cryptographically suitable Cellular Automata.


cellular automata for research and industry | 2012

Countermeasures of Side Channel Attacks on Symmetric Key Ciphers Using Cellular Automata

Sandip Karmakar; Dipanwita Roy Chowdhury

Leakage squeezing is a novel approach towards resisting side channel attacks against cryptographic implementations. It is seen that certain codes are ideal for leakage squeezing applications. However, in this paper we argue that few other cryptographic properties are essential for better squeezing. In this respect we analyze few Cellular Automata (CA) configurations towards suitability in leakage squeezing. It is argued that nonlinear cellular automata with respective cryptographic and code properties are ideal for applications in this scenario.


Journal of Cellular Automata | 2012

CAvium - Strengthening Trivium Stream Cipher Using Cellular Automata

Sandip Karmakar; Debdeep Mukhopadhyay; Dipanwita Roy Chowdhury

Side Channel Attacks (SCA) are one of the most effective means in breaking symmetric key ciphers. Generally, SCA exploits the side-channel leakages output by the implementations of ciphers or introduces defects in the system to analyze them. A number of countermeasures have been proposed to strengthen/remedy implementations of ciphers against SCA. However, none of the countermeasures, to our knowledge, are good enough towards its goal ([16], [19], [3]). In this paper, we emphasis on the necessity of randomness in designing countermeasures against SCA and propose Cellular Automata (CA) based system to thwart SCA. Our countermeasure is also analyzed against popular SCA, such as, differential power attack (DPA), scan-chain based attacks (SC-SCA) and fault attacks (FA).


IACR Cryptology ePrint Archive | 2014

Fault Analysis of Grain Family of Stream Ciphers.

Sandip Karmakar; Dipanwita Roy Chowdhury


IACR Cryptology ePrint Archive | 2014

Differential Fault Analysis of MICKEY Family of Stream Ciphers

Sandip Karmakar; Dipanwita Roy Chowdhury


Discrete Mathematics & Theoretical Computer Science | 2011

NOCAS : A Nonlinear Cellular Automata Based Stream Cipher

Sandip Karmakar; Dipanwita Roy Chowdhury

Collaboration


Dive into the Sandip Karmakar's collaboration.

Top Co-Authors

Avatar

Dipanwita Roy Chowdhury

Indian Institute of Technology Kharagpur

View shared research outputs
Top Co-Authors

Avatar

Debdeep Mukhopadhyay

Indian Institute of Technology Kharagpur

View shared research outputs
Top Co-Authors

Avatar

Dhiman Saha

Indian Institute of Technology Kharagpur

View shared research outputs
Top Co-Authors

Avatar

Mukesh Agrawal

Indian Institute of Technology Kharagpur

View shared research outputs
Researchain Logo
Decentralizing Knowledge