Paper 2026/067

MALeak: Blind Side-Channel Key Recovery Exploiting Modular Addition Leakage in ARX-based Block Ciphers

Inhun Lee, Korea University
GyuSang Kim, Korea University
Seokhie Hong, SmartM2M
HeeSeok Kim, Korea University
Abstract

Side-channel analysis (SCA) can recover secret keys by exploiting physical leakages emitted during cryptographic computations. Most SCA techniques, however, require knowledge of the plaintext or ciphertext corresponding to each measured trace, which may be unavailable in realistic adversarial settings. Blind side-channel analysis (Blind SCA), first introduced in 2014, relaxes this requirement, but existing work has mainly targeted S-box nonlinearities. We present a systematic study of blind SCA targeting modular addition, the core nonlinear operation in ARX-based block ciphers, by leveraging key-dependent statistical characteristics arising from carry propagation. We introduce MALeak, a framework that models analysis targets as generalized key-dependent functions involving modular addition. We validate key recovery in simulation under varying noise levels and instantiate MALeak for HIGHT and SPECK by deriving cipher-specific attack procedures. We further evaluate the MALeak instantiations for HIGHT and SPECK on real power traces collected from an STM32F415 microcontroller (ARM Cortex-M4). Our results show that, given suitable points of interest (PoIs), MALeak can recover secret keys of ARX-based block ciphers without access to the corresponding plaintext or ciphertext.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Blind side-channel analysisARX-based block cipherHIGHTSPECKModular addition
Contact author(s)
dldlsgns99 @ korea ac kr
ks9509 @ korea ac kr
shhong @ smartm2m co kr
80khs @ korea ac kr
History
2026-02-09: last of 4 revisions
2026-01-16: received
See all versions
Short URL
https://ia.cr/2026/067
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2026/067,
      author = {Inhun Lee and GyuSang Kim and Seokhie Hong and HeeSeok Kim},
      title = {{MALeak}: Blind Side-Channel Key Recovery Exploiting Modular Addition Leakage in {ARX}-based Block Ciphers},
      howpublished = {Cryptology {ePrint} Archive, Paper 2026/067},
      year = {2026},
      url = {https://eprint.iacr.org/2026/067}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.