Attacking state-of-the-art software countermeasures - A case study for AES

被引:0
|
作者
Tillich, Stefan [1 ]
Herbst, Christoph [1 ]
机构
[1] Graz Univ Technol, Inst Appl Informat Proc & Commun, A-8010 Graz, Austria
来源
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2008, PROCEEDINGS | 2008年 / 5154卷
关键词
Advanced Encryption Standard; smart card; side channel attacks; power analysis; software countermeasures; masking; operation randomization; advanced DPA attacks;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In order to protect, software implementations of secret-key cryptographic primitives against side channel attacks, a software developer has only a limited choice of countermeasures. A combination of masking and randomization of operations in time promises good protection and can be realized without too Pinch overhead. Recently, new advanced DPA methods have been proposed to attack Software implementations with such kind of protection. In this work, we have applied these methods successfully to break a protected AES software implementation on a programmable smart card. Thus, we were able to verify the practicality of the new attacks and to estimate their effectiveness in comparison to traditional DPA attacks on unprotected implementations. I it the course of our work, we have also refined and improved the original attacks, so that they can be mounted more efficiently. Our practical results indicate that the effort required for attacking tale protected implementation with the examined methods is more than two orders of magnitude higher compared to an attack on an unprotected implementation.
引用
收藏
页码:228 / 243
页数:16
相关论文
共 12 条
  • [1] A Survey of the State-of-the-Art Fault Attacks
    Breier, Jakub
    Jap, Dirmanto
    2014 14TH INTERNATIONAL SYMPOSIUM ON INTEGRATED CIRCUITS (ISIC), 2014, : 152 - 155
  • [2] Smart Cards: State-of-the-Art to Future Directions
    Akram, Raja Naeem
    Markantonakis, Konstantinos
    2013 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (IEEE ISSPIT 2013), 2013, : 154 - 162
  • [3] State-of-the-art research on electromagnetic information security
    Hayashi, Yu-ichi
    RADIO SCIENCE, 2016, 51 (07) : 1213 - 1219
  • [4] Security analysis on dummy based side-channel countermeasures-Case study: AES with dummy and shuffling
    Lee, JongHyeok
    Han, Dong-Guk
    APPLIED SOFT COMPUTING, 2020, 93
  • [5] A State-of-the-Art Review: Personalization of Tinnitus Sound Therapy
    Searchfield, Grant D.
    Durai, Mithila
    Linford, Tania
    FRONTIERS IN PSYCHOLOGY, 2017, 8
  • [6] Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods
    Moradi, Amir
    Kirschbaum, Mario
    Eisenbarth, Thomas
    Paar, Christof
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2012, 20 (09) : 1578 - 1589
  • [7] Verifying Redundant-Check Based Countermeasures: A Case Study
    Martin, Thibault
    Kosmatov, Nikolai
    Prevosto, Virgile
    37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2022, : 1849 - 1852
  • [8] State-of-the-Art Analysis of Deep Learning-Based Monaural Speech Source Separation Techniques
    Soni, Swati
    Yadav, Ram Narayan
    Gupta, Lalita
    IEEE ACCESS, 2023, 11 : 4242 - 4269
  • [9] DeepFakes for Privacy: Investigating the Effectiveness of State-of-the-Art Privacy-Enhancing Face Obfuscation Methods
    Khamis, Mohamed
    Farzand, Habiba
    Mumm, Marija
    Marky, Karola
    PROCEEDINGS OF THE WORKING CONFERENCE ON ADVANCED VISUAL INTERFACES AVI 2022, 2022,
  • [10] A Generic Method for the Analysis of a Class of Cache Attacks: A Case Study for AES
    Savas, Erkay
    Yilmaz, Cemal
    COMPUTER JOURNAL, 2015, 58 (10) : 2716 - 2737