Amplifying side-channel attacks with techniques from block cipher cryptanalysis

被引:0
|
作者
Phan, Raphael C. -W.
Yen, Sung-Ming
机构
[1] Swinburne Univ Technol, ISECURES Lab, Kuching, Malaysia
[2] Natl Cent Univ, Dept Comp Sci & Informat Engn, LCIS, Chungli 320, Taiwan
来源
SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS | 2006年 / 3928卷
关键词
attacks and countermeasures in hardware and software; side-channel attacks; cryptanalysis; fault attacks; Advanced Encryption Standard;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce the notion of amplified side-channel attacks, i.e. the application of block cipher cryptanalysis techniques to amplify effects exploitable by side-channel attacks. Such an approach is advantageous since it fully exploits the special characteristics of each technique in situations where each thrives the most. As an example, we consider the integration of block cipher cryptanalysis techniques into a particular type of side-channel attack, the differential fault attack (DFA). In more detail, we apply the DFA on the AES key schedule or on intermediate states within the AES and then exploit distinguishers based on Square attacks and impossible differential cryptanalysis to cover the remaining rounds. The use of techniques from conventional differential cryptanalysis in DFAs is not new; however, to the best of our knowledge, more advanced differential-like attack techniques have so far not been applied in collaboration with DFA. Purther, while previous DFA attacks can only be mounted if faults are induced in the last or first (but with more restrictions) few rounds, our attacks alternatively show that even when faults are induced into some middle rounds, the DFA attacks still work, complementing existing results in literature; and thus showing that DFA attacks work regardless of where faults are induced. This is of importance because redundancy is a costly countermeasure against DFA and thus it is vital to study which rounds have to be protected. We hope that this completes the picture on the applicability of DFAs to block ciphers, and motivates thoughts into applying other advanced block cipher cryptanalysis techniques into other types of side-channel attacks.
引用
收藏
页码:135 / 150
页数:16
相关论文
共 50 条
  • [1] On Side-Channel Resistant Block Cipher Usage
    Guajardo, Jorge
    Mennink, Bart
    INFORMATION SECURITY, 2011, 6531 : 254 - +
  • [2] Algebraic side-channel attacks on Trivium stream cipher
    Sun, Wenlong
    Guan, Jie
    IET COMMUNICATIONS, 2024, 18 (19) : 1335 - 1347
  • [3] Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks
    Santoso, Bagus
    Oohama, Yasutada
    ENTROPY, 2019, 21 (05):
  • [4] Applications of machine learning techniques in side-channel attacks: a survey
    Hettwer, Benjamin
    Gehrer, Stefan
    Gueneysu, Tim
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) : 135 - 162
  • [5] TED: A LIGHTWEIGHT BLOCK CIPHER FOR IoT DEVICES WITH SIDE-CHANNEL ATTACK RESISTANCE
    Thorat, Chandrama
    Inamdar, Vandana
    Jadhav, Bhagvat
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2020, 12 (02): : 83 - 96
  • [6] On the Detection of Side-Channel Attacks
    Vateva-Gurova, Tsvetoslava
    Suri, Neeraj
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 185 - 186
  • [7] Algebraic Side-Channel Attacks
    Renauld, Mathieu
    Standaert, Francois-Xavier
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 393 - 410
  • [8] Applications of machine learning techniques in side-channel attacks: a survey
    Benjamin Hettwer
    Stefan Gehrer
    Tim Güneysu
    Journal of Cryptographic Engineering, 2020, 10 : 135 - 162
  • [9] Concurrent error detection of fault-based side-channel cryptanalysis of 128-bit RC6 block cipher
    Wu, KJ
    Mishra, P
    Karri, R
    MICROELECTRONICS JOURNAL, 2003, 34 (01) : 31 - 39
  • [10] Automated Instantiation of Side-Channel Attacks Countermeasures for Software Cipher Implementations Position Paper
    Agosta, Giovanni
    Barenghi, Alessandro
    Pelosi, Gerardo
    PROCEEDINGS OF THE ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS (CF'16), 2016, : 455 - 460