Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA

被引:0
|
作者
Renauld, Mathieu [1 ]
Standaert, Francois-Xavier [1 ]
Veyrat-Charvillon, Nicolas [1 ]
机构
[1] Catholic Univ Louvain, UCL Crypto Grp, B-1348 Louvaine La Neuve, Belgium
来源
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS | 2009年 / 5747卷
关键词
COLLISION ATTACKS; BLOCK CIPHERS; CRYPTANALYSIS; IMPLEMENTATIONS; EQUATIONS; SYSTEMS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Algebraic side-channel attacks have been recently introduced as a powerful cryptanalysis technique against block ciphers. These attacks represent both a target algorithm and its physical information leakages as an overdefined system of equations that the adversary tries to solve. They were first applied to PRESENT because of its simple algebraic structure. In this paper, we investigate the extent to which they can be exploited against; the AES Rijndael and discuss their practical specificities. We show experimentally that most of the intuitions that hold for PRESENT can also be observed for an unprotected implementation of Rijndael in an 8-bit controller. Namely, algebraic side-channel attacks can recover the AES master key with the observation of a single encrypted plaintext and they easily deal with unknown plaintexts/ciphertexts in this context. Because these attacks can take advantage of the physical information corresponding to all the cipher rounds, they imply that one cannot trade speed for code size (or gate count) without affecting the physical security of a leaking device. In other words, more intermediate computations inevitably leads to more exploitable leakages. We analyze the consequences of this observation on two different masking schemes and discuss its impact on other countermeasures. Our results exhibit that algebraic techniques lead to a new understanding of implementation weaknesses that is different; than classical side-channel attacks.
引用
收藏
页码:97 / 111
页数:15
相关论文
共 36 条
  • [31] Cryptographic Coprocessor with Modular Architecture for Research and Development of Countermeasures Against Power-Based Side-Channel Attacks
    Korona, Mateusz
    Wojciechowski, Tomasz
    Rawski, Mariusz
    Tomaszewicz, Pawel
    PROCEEDINGS OF THE 2019 26TH INTERNATIONAL CONFERENCE MIXED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (MIXDES 2019), 2019, : 190 - 195
  • [32] Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations
    Guo, Shize
    Zhao, Xinjie
    Zhang, Fan
    Wang, Tao
    Shi, Zhijie Jerry
    Standaert, Francois-Xavier
    Ma, Chujiao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (06) : 999 - 1014
  • [33] Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
    Medwed, Marcel
    Standaert, Francois-Xavier
    Grossschaedl, Johann
    Regazzoni, Francesco
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 279 - +
  • [34] The Switching Generator: New Clock-Controlled Generator with Resistance against the Algebraic and Side Channel Attacks
    Choi, Jun
    Moon, Dukjae
    Hong, Seokhie
    Sung, Jaechul
    ENTROPY, 2015, 17 (06): : 3692 - 3709
  • [35] Side-Channel Attacks on BLISS Lattice-Based Signatures Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers
    Espitau, Thomas
    Fouque, Pierre-Alain
    Gerard, Benoit
    Tibouchi, Mehdi
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1857 - 1874
  • [36] Estimating the Signal-to-Noise Ratio Under Repeated Sampling of the Same Centered Signal: Applications to Side-Channel Attacks on a Cryptoprocessor
    Ducharme, Gilles R.
    Maurine, Philippe
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (09) : 6333 - 6339