Amplifying side-channel attacks with techniques from block cipher cryptanalysis

被引:0
|
作者
Phan, Raphael C. -W.
Yen, Sung-Ming
机构
[1] Swinburne Univ Technol, ISECURES Lab, Kuching, Malaysia
[2] Natl Cent Univ, Dept Comp Sci & Informat Engn, LCIS, Chungli 320, Taiwan
来源
SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS | 2006年 / 3928卷
关键词
attacks and countermeasures in hardware and software; side-channel attacks; cryptanalysis; fault attacks; Advanced Encryption Standard;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce the notion of amplified side-channel attacks, i.e. the application of block cipher cryptanalysis techniques to amplify effects exploitable by side-channel attacks. Such an approach is advantageous since it fully exploits the special characteristics of each technique in situations where each thrives the most. As an example, we consider the integration of block cipher cryptanalysis techniques into a particular type of side-channel attack, the differential fault attack (DFA). In more detail, we apply the DFA on the AES key schedule or on intermediate states within the AES and then exploit distinguishers based on Square attacks and impossible differential cryptanalysis to cover the remaining rounds. The use of techniques from conventional differential cryptanalysis in DFAs is not new; however, to the best of our knowledge, more advanced differential-like attack techniques have so far not been applied in collaboration with DFA. Purther, while previous DFA attacks can only be mounted if faults are induced in the last or first (but with more restrictions) few rounds, our attacks alternatively show that even when faults are induced into some middle rounds, the DFA attacks still work, complementing existing results in literature; and thus showing that DFA attacks work regardless of where faults are induced. This is of importance because redundancy is a costly countermeasure against DFA and thus it is vital to study which rounds have to be protected. We hope that this completes the picture on the applicability of DFAs to block ciphers, and motivates thoughts into applying other advanced block cipher cryptanalysis techniques into other types of side-channel attacks.
引用
收藏
页码:135 / 150
页数:16
相关论文
共 50 条
  • [31] How to Compare Profiled Side-Channel Attacks?
    Standaert, Francois-Xavier
    Koeune, Francois
    Schindler, Werner
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 485 - +
  • [32] On the Feasibility of Side-Channel Attacks in a Virtualized Environment
    Vateva-Gurova, Tsvetoslava
    Luna, Jesus
    Pellegrino, Giancarlo
    Suri, Neeraj
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 319 - 339
  • [33] Side-Channel Attack on the A5/1 Stream Cipher
    Jurecek, Martin
    Bucek, Jiri
    Lorencz, Robert
    2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 633 - 638
  • [34] Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers
    Karri, R
    Wu, KJ
    Mishra, P
    Kim, Y
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2002, 21 (12) : 1509 - 1517
  • [35] Side channel attacks against HMACs based on block-cipher based hash functions
    Okeya, Katsuyuki
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 432 - 443
  • [36] Side-channel cryptographic attacks using pseudo-boolean optimization
    Oren, Yossef
    Wool, Avishai
    CONSTRAINTS, 2016, 21 (04) : 616 - 645
  • [37] Side-channel cryptographic attacks using pseudo-boolean optimization
    Yossef Oren
    Avishai Wool
    Constraints, 2016, 21 : 616 - 645
  • [38] ISA Extensions of Shuffling Against Side-Channel Attacks
    Zhou, Jiayun
    Qin, Guofeng
    Li, Lu
    Guo, Chun
    Wang, Weijia
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 43 (03) : 761 - 773
  • [39] Applying Thermal Side-Channel Attacks on Asymmetric Cryptography
    Aljuffri, Abdullah
    Zwalua, Marc
    Reinbrecht, Cezar Rodolfo Wedig
    Hamdioui, Said
    Taouil, Mottaqiallah
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2021, 29 (11) : 1930 - 1942
  • [40] Side-channel attacks and learning-vector quantization
    Saeedi, Ehsan
    Kong, Yinan
    Hossain, Md. Selim
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (04) : 511 - 518