Improving Efficiency of Key Enumeration Based on Side-Channel Analysis

被引:0
|
作者
Yang, Wei [1 ]
Fu, Anmin [1 ]
Zhang, Hailong [2 ]
Huang, Chanying [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
基金
中国国家自然科学基金;
关键词
Security evaluation; side-channel analysis; key enumeration; key rank; multi-channel leakages;
D O I
10.1109/TrustCom50675.2020.00021
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel analysis (SCA) is usually used for analyzing the side-channel resistance of a crypto device. However, it does not mean "practical secure" when a SCA attack fails since SCA only provides a success or failure conclusion. On the basis of the SCA data about scores and ranks of all candidates for each subkey, it is still possible to apply key enumeration (KE) algorithms to search the correct master key at an affordable overhead. Nevertheless, the efficiency of KE is limited by the SCA data in essence. To address the issue, we proposed two methods to exploit the SCA data and Riemann integral of the rank curves of all subkey candidates to update each correct subkey rank before carrying out KE. We applied the proposed methods for different crypto implementations running on different devices to verify their performance. Experimental studies for both mono-channel and multi-channel leakages verified that the proposed methods were effective in improving the efficiency of KE to recover the correct key. The proposed methods are designed for processing the SCA data and can be deemed as a preliminary before executing KE. The work of this paper bridges the gap between SCA and KE.
引用
收藏
页码:54 / 61
页数:8
相关论文
共 50 条
  • [1] Weighted Key Enumeration for EM-based Side-Channel Attacks
    Li, Yang
    Meng, Xiaohan
    Wang, Shuang
    Wang, Jian
    2018 JOINT IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY AND 2018 IEEE ASIA-PACIFIC SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC/APEMC), 2018, : 749 - 752
  • [2] A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel Attacks
    Li, Yang
    Wang, Shuang
    Wang, Zhibin
    Wang, Jian
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2017), 2018, 10728 : 51 - 69
  • [3] Improving recent side-channel attacks against the DES key schedule
    Wiemers, Andreas
    Mittmann, Johannes
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2023, 13 (01) : 1 - 17
  • [4] Improving recent side-channel attacks against the DES key schedule
    Andreas Wiemers
    Johannes Mittmann
    Journal of Cryptographic Engineering, 2023, 13 : 1 - 17
  • [5] Channel state information based key generation vs. side-channel analysis key information leakage
    Li H.
    Zhang Q.
    Yuan H.
    Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011, 2011, : 264 - 268
  • [6] A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
    Standaert, Francois-Xavier
    Malkin, Tal G.
    Yung, Moti
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 443 - +
  • [7] Exploring Genomic Sequence Alignment for Improving Side-Channel Analysis
    Uchoa, Heitor
    Arora, Vipul
    Vermoen, Dennis
    Ottavi, Marco
    Alachiotis, Nikolaos
    COMPUTER SECURITY - ESORICS 2023, PT III, 2024, 14346 : 203 - 221
  • [8] Side-Channel Analysis of Keymill
    Dobraunig, Christoph
    Eichlseder, Maria
    Korak, Thomas
    Mendel, Florian
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2017, 10348 : 138 - 152
  • [9] On XTR and side-channel analysis
    Page, D
    Stam, M
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 54 - 68
  • [10] On XTR and side-channel analysis
    Page, Daniel
    Stam, Martijn
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3357 : 54 - 68