DES with any reduced masked rounds is not secure against side-channel attacks

被引:7
作者
Kim, Jongsung [2 ]
Lee, Yuseop [1 ]
Lee, Sangjin [1 ]
机构
[1] Korea Univ, CIST, Seoul, South Korea
[2] Kyungnam Univ, Div E Business, Masan, South Korea
关键词
Side-channel attacks; Differentials; DES;
D O I
10.1016/j.camwa.2010.01.011
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The literature offers several efficient masking methods for providing resistance to side-channel attacks against iterative block ciphers, such as Data Encryption Standard (DES) and Advanced Encryption Standard (AES). One of the proposed methods is to apply independent masks to each of the first and last few rounds. However, at the workshops on Selected Areas in Cryptography (SAC) 2006 and Cryptographic Hardware and Embedded System (CHES) 2007, Handschuh-Preneel and Biryukov-Khovratovich showed that DES and AES with such reduced masked rounds are still vulnerable to side-channel attacks combined with block cipher cryptanalysis. Specifically, Handschuh and Preneel presented differential based side-channel attacks on DES with the first 4 rounds masked, and Biryukov and Khovratovich presented impossible and multiset collision based side-channel attacks on AES with the first 2, 3 and 4 rounds masked. More recently, Kim and Hong showed that AES-192 and AES-256 with the first 5 rounds masked are also vulnerable to side-channel attacks based on the meet-in-the-middle technique. In this paper, we focus on the security of DES with reduced masked rounds against side-channel attacks; we propose differential based side-channel attacks on DES with the first 5, 6 and 7 rounds masked: they require 2(17.4), 2(24), 2(35.5) chosen plaintexts with associate power traces and collision measurements, correspondingly. Our attacks are the first known side-channel attacks on DES with the first 5, 6 and 7 rounds masked: our attack results show that DES with any reduced masked rounds is not secure against side-channel attacks, i.e., in order for DES to be resistant to side-channel attacks, entire rounds should be masked. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:347 / 354
页数:8
相关论文
共 50 条
[31]   Improving side-channel attacks against pairing-based cryptography [J].
Damien Jauvart ;
Nadia El Mrabet ;
Jacques J. A. Fournier ;
Louis Goubin .
Journal of Cryptographic Engineering, 2020, 10 :1-16
[32]   FourQ on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks [J].
Liu, Zhe ;
Longa, Patrick ;
Pereira, Geovandro C. C. F. ;
Reparaz, Oscar ;
Seo, Hwajeong .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 :665-686
[33]   On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks [J].
Dabosville, Guillaume ;
Maghrebi, Houssem ;
Lhuillery, Alexis ;
Le, Thanh-Ha ;
Bringer, Julien .
2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, :214-221
[34]   Using Virtual Secure Circuit to Protect Embedded Software from Side-Channel Attacks [J].
Chen, Zhimin ;
Sinha, Ambuj ;
Schaumont, Patrick .
IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (01) :124-136
[35]   Fast Side-Channel Security Evaluation of ECC Implementations Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder [J].
Azouaoui, Melissa ;
Poussier, Romain ;
Standaert, Francois-Xavier .
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 :25-42
[36]   Securing Applications against Side-channel Attacks through Resource Access Veto [J].
Osman, Tousif ;
Mannan, Mohammad ;
Hengartner, Urs ;
Youssef, Amr .
DIGITAL THREATS: RESEARCH AND PRACTICE, 2020, 1 (04)
[37]   Protecting Cryptographic Libraries Against Side-Channel and Code-Reuse Attacks [J].
Tsoupidi, Rodothea Myrsini ;
Troubitsyna, Elena ;
Papadimitratos, Panos .
IEEE SECURITY & PRIVACY, 2024, :2-11
[38]   A Hardware-Friendly Shuffling Countermeasure Against Side-Channel Attacks for Kyber [J].
Xu, Dejun ;
Wang, Kai ;
Tian, Jing .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2025, 72 (03) :504-508
[39]   DEFENDING AGAINST PACKET-SIZE SIDE-CHANNEL ATTACKS IN IOT NETWORKS [J].
Xiong, Sijie ;
Sarwate, Anand D. ;
Mandayam, Narayan B. .
2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2018, :2027-2031
[40]   Anonymous CP-ABE Against Side-Channel Attacks in Cloud Computing [J].
Zhang, Jing-Xia ;
Zhang, Le-You .
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) :789-805