Amplifying side-channel attacks with techniques from block cipher cryptanalysis

被引:0
|
作者
Phan, Raphael C. -W.
Yen, Sung-Ming
机构
[1] Swinburne Univ Technol, ISECURES Lab, Kuching, Malaysia
[2] Natl Cent Univ, Dept Comp Sci & Informat Engn, LCIS, Chungli 320, Taiwan
来源
SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS | 2006年 / 3928卷
关键词
attacks and countermeasures in hardware and software; side-channel attacks; cryptanalysis; fault attacks; Advanced Encryption Standard;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce the notion of amplified side-channel attacks, i.e. the application of block cipher cryptanalysis techniques to amplify effects exploitable by side-channel attacks. Such an approach is advantageous since it fully exploits the special characteristics of each technique in situations where each thrives the most. As an example, we consider the integration of block cipher cryptanalysis techniques into a particular type of side-channel attack, the differential fault attack (DFA). In more detail, we apply the DFA on the AES key schedule or on intermediate states within the AES and then exploit distinguishers based on Square attacks and impossible differential cryptanalysis to cover the remaining rounds. The use of techniques from conventional differential cryptanalysis in DFAs is not new; however, to the best of our knowledge, more advanced differential-like attack techniques have so far not been applied in collaboration with DFA. Purther, while previous DFA attacks can only be mounted if faults are induced in the last or first (but with more restrictions) few rounds, our attacks alternatively show that even when faults are induced into some middle rounds, the DFA attacks still work, complementing existing results in literature; and thus showing that DFA attacks work regardless of where faults are induced. This is of importance because redundancy is a costly countermeasure against DFA and thus it is vital to study which rounds have to be protected. We hope that this completes the picture on the applicability of DFAs to block ciphers, and motivates thoughts into applying other advanced block cipher cryptanalysis techniques into other types of side-channel attacks.
引用
收藏
页码:135 / 150
页数:16
相关论文
共 50 条
  • [41] A Memory Hierarchy Protected against Side-Channel Attacks
    Talaki, Ezinam Bertrand
    Savry, Olivier
    Bouvier Des Noes, Mathieu
    Hely, David
    CRYPTOGRAPHY, 2022, 6 (02)
  • [42] Practical Algebraic Side-Channel Attacks Against ACORN
    Adomnicai, Alexandre
    Masson, Laurent
    Fournier, Jacques J. A.
    INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 325 - 340
  • [43] Hardware Security: Physical Design versus Side-channel and Fault Attacks
    Verbauwhede, Ingrid
    ISPD'22: PROCEEDINGS OF THE 2022 INTERNATIONAL SYMPOSIUM ON PHYSICAL DESIGN, 2022, : 219 - 219
  • [44] Moving Target Defense Mechanism for Side-Channel Attacks
    Vuppala, Satyanarayana
    Mady, Alie El-Din
    Kuenzi, Adam
    IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 1810 - 1819
  • [45] Timing Side-channel Attacks and Countermeasures in CPU Microarchitectures
    Zhang, Jiliang
    Chen, Congcong
    Cui, Jinhua
    Li, Keqin
    ACM COMPUTING SURVEYS, 2024, 56 (07)
  • [46] The investigation of neural networks performance in side-channel attacks
    Kong, Yinan
    Saeedi, Ehsan
    ARTIFICIAL INTELLIGENCE REVIEW, 2019, 52 (01) : 607 - 623
  • [47] Threshold implementations against side-channel attacks and glitches
    Nikova, Svetla
    Rechberger, Christian
    Rijmen, Vincent
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 529 - +
  • [48] Side-channel attacks and learning-vector quantization
    Ehsan Saeedi
    Yinan Kong
    Md. Selim Hossain
    Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 511 - 518
  • [49] Unified point addition formulae and side-channel attacks
    Stebila, Douglas
    Theriault, Nicolas
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 354 - 368
  • [50] An Efficient Method against Side-Channel Attacks on ECC
    LIU Shuanggen~ 1
    2. College of Computer Information Engineering
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1573 - 1576