On Side Channel Vulnerabilities of Bit Permutations in Cryptographic Algorithms

被引:8
|
作者
Breier, Jakub [1 ]
Jap, Dirmanto [2 ]
Hou, Xiaolu [3 ]
Bhasin, Shivam [2 ]
机构
[1] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore 639798, Singapore
[2] Nanyang Technol Univ, Temasek Labs, Phys Anal & Cryptog Engn Lab, Singapore 637553, Singapore
[3] Natl Univ Singapore, Sch Comp, Singapore 119077, Singapore
基金
新加坡国家研究基金会;
关键词
Block ciphers; side-channel attacks; bit permutations; implementation attacks; ATTACK;
D O I
10.1109/TIFS.2019.2932230
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Lightweight block ciphers rely on simple operations to allow compact implementation. Thanks to its efficiency, bit permutation has emerged as an optimal choice for state-wise diffusion. It can be implemented by simple wiring in hardware or shifts in software. However, efficiency and security often go against each other. In this paper, we show how bit permutations introduce a side-channel vulnerability that can be exploited to extract the secret key from the cipher. Such vulnerabilities are specific to bit permutations and do not occur in other state-wise diffusion alternatives. We propose side-channel assisted differential-plaintext attack (SCADPA) which targets this vulnerability in the bit permutation operation. SCADPA is first experimentally demonstrated on PRESENT-80 on an 8-bit microcontroller, with the best case key recovery in 17 encryptions. In Addition, we adjust SCADPA to state-of-the-art bit sliced implementation from CHES'17 with experimental evaluation on a 32-bit microcontroller. The attack is then extended to latest bit-permutation-based cipher GIFT, allowing full key recovery in 36 encryptions. Application for reverse engineering of secret S-boxes in PRESENT-like proprietary ciphers is also shown.
引用
收藏
页码:1072 / 1085
页数:14
相关论文
共 50 条
  • [1] CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations
    Deng, Sen
    Li, Mengyuan
    Tang, Yining
    Wang, Shuai
    Yan, Shoumeng
    Zhang, Yinqian
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6843 - 6860
  • [2] ZipChannel: Cache Side-Channel Vulnerabilities in Compression Algorithms
    Minkin, Marina
    Kasikci, Baris
    2024 54TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, DSN 2024, 2024, : 223 - 237
  • [3] A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries
    Geimer, Antoine
    Vergnolle, Matheo
    Recoules, Frederic
    Daniel, Lesly-Ann
    Bardin, Sebastien
    Maurice, Clementine
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1690 - 1704
  • [4] A Survey of Prototype Side-channel Attacks Based on Machine Learning Algorithms for Cryptographic Chips
    Guo, Dongxin
    Chen, Kaiyan
    Hu, Xiaoyang
    Wei, Yanhai
    Li, Jianlong
    2018 INTERNATIONAL SEMINAR ON COMPUTER SCIENCE AND ENGINEERING TECHNOLOGY (SCSET 2018), 2019, 1176
  • [5] Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code
    Erata, Ferhat
    Piskac, Ruzica
    Mateu, Victor
    Szefer, Jakub
    2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, : 687 - 706
  • [6] Side Channel Analysis and Evaluation on Cryptographic Products
    Chen H.
    Xi W.
    Fan L.
    Jiao Z.
    Feng J.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2020, 42 (08): : 1836 - 1845
  • [7] Side-Channel Attacks on Cryptographic Software
    Lawson, Nate
    IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68
  • [8] Side Channel Analysis and Evaluation on Cryptographic Products
    Chen Hua
    Xi Wei
    Fan Limin
    Jiao Zhipeng
    Feng Jingyi
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (08) : 1836 - 1845
  • [9] Cryptographic design vulnerabilities
    Schneier, B
    COMPUTER, 1998, 31 (09) : 29 - +
  • [10] ON THE CRYPTOGRAPHIC SYSTEM VULNERABILITIES
    Unkasevic, Tomislav B.
    Peric, Miroslav V.
    Banjac, Zoran D.
    2015 23RD TELECOMMUNICATIONS FORUM TELFOR (TELFOR), 2015, : 110 - 113