Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA

被引:0
|
作者
Renauld, Mathieu [1 ]
Standaert, Francois-Xavier [1 ]
Veyrat-Charvillon, Nicolas [1 ]
机构
[1] Catholic Univ Louvain, UCL Crypto Grp, B-1348 Louvaine La Neuve, Belgium
来源
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS | 2009年 / 5747卷
关键词
COLLISION ATTACKS; BLOCK CIPHERS; CRYPTANALYSIS; IMPLEMENTATIONS; EQUATIONS; SYSTEMS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Algebraic side-channel attacks have been recently introduced as a powerful cryptanalysis technique against block ciphers. These attacks represent both a target algorithm and its physical information leakages as an overdefined system of equations that the adversary tries to solve. They were first applied to PRESENT because of its simple algebraic structure. In this paper, we investigate the extent to which they can be exploited against; the AES Rijndael and discuss their practical specificities. We show experimentally that most of the intuitions that hold for PRESENT can also be observed for an unprotected implementation of Rijndael in an 8-bit controller. Namely, algebraic side-channel attacks can recover the AES master key with the observation of a single encrypted plaintext and they easily deal with unknown plaintexts/ciphertexts in this context. Because these attacks can take advantage of the physical information corresponding to all the cipher rounds, they imply that one cannot trade speed for code size (or gate count) without affecting the physical security of a leaking device. In other words, more intermediate computations inevitably leads to more exploitable leakages. We analyze the consequences of this observation on two different masking schemes and discuss its impact on other countermeasures. Our results exhibit that algebraic techniques lead to a new understanding of implementation weaknesses that is different; than classical side-channel attacks.
引用
收藏
页码:97 / 111
页数:15
相关论文
共 36 条
  • [21] Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note
    Veyrat-Charvillon, Nicolas
    Medwed, Marcel
    Kerckhof, Stephanie
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2012, 2012, 7658 : 740 - 757
  • [22] Amplifying side-channel attacks with techniques from block cipher cryptanalysis
    Phan, Raphael C. -W.
    Yen, Sung-Ming
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2006, 3928 : 135 - 150
  • [23] Aiding side-channel attacks on cryptographic software with satisfiability-based analysis
    Potlapally, Nachiketh R.
    Raghunathan, Anand
    Ravi, Srivaths
    Jha, Niraj K.
    Lee, Ruby B.
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2007, 15 (04) : 465 - 470
  • [24] New Versions of Miller-loop Secured Against Side-Channel Attacks
    El Mrabet, Nadia
    Ghammam, Loubna
    Meloni, Nicolas
    Fouotsa, Emmanuel
    ARITHMETIC OF FINITE FIELDS, WAIFI 2022, 2023, 13638 : 269 - 287
  • [25] Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices
    Standaert, Francois-Xavier
    Gierlichs, Benedikt
    Verbauwhede, Ingrid
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 253 - +
  • [26] A statistical verification method of random permutations for hiding countermeasure against side-channel attacks
    Park, Jong-Yeon
    Ju, Jang-Won
    Lee, Wonil
    Kang, Bo Gyeong
    Kachi, Yasuyuki
    Sakurai, Kouichi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 84
  • [27] Side-channel attacks on HIGHT with reduced masked rounds suitable for the protection of multimedia computing system
    Lee, Yuseop
    Kim, Jongsung
    Hong, Seokhie
    MULTIMEDIA TOOLS AND APPLICATIONS, 2012, 56 (02) : 267 - 280
  • [28] REHAD: Using Low-Frequency Reconfigurable Hardware for Cache Side-Channel Attacks Detection
    Mao, Yuxiao
    Migliore, Vincent
    Nicomette, Vincent
    2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020), 2020, : 704 - 709
  • [29] The Kingsguard OS-level mitigation against cache side-channel attacks using runtime detection
    Mushtaq, Maria
    Yousaf, Muhammad Muneeb
    Bhatti, Muhammad Khurram
    Lapotre, Vianney
    Gogniat, Guy
    ANNALS OF TELECOMMUNICATIONS, 2022, 77 (11-12) : 731 - 747
  • [30] The Kingsguard OS-level mitigation against cache side-channel attacks using runtime detection
    Maria Mushtaq
    Muhammad Muneeb Yousaf
    Muhammad Khurram Bhatti
    Vianney Lapotre
    Guy Gogniat
    Annals of Telecommunications, 2022, 77 : 731 - 747