Improving Efficiency of Key Enumeration Based on Side-Channel Analysis

被引:0
|
作者
Yang, Wei [1 ]
Fu, Anmin [1 ]
Zhang, Hailong [2 ]
Huang, Chanying [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
基金
中国国家自然科学基金;
关键词
Security evaluation; side-channel analysis; key enumeration; key rank; multi-channel leakages;
D O I
10.1109/TrustCom50675.2020.00021
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel analysis (SCA) is usually used for analyzing the side-channel resistance of a crypto device. However, it does not mean "practical secure" when a SCA attack fails since SCA only provides a success or failure conclusion. On the basis of the SCA data about scores and ranks of all candidates for each subkey, it is still possible to apply key enumeration (KE) algorithms to search the correct master key at an affordable overhead. Nevertheless, the efficiency of KE is limited by the SCA data in essence. To address the issue, we proposed two methods to exploit the SCA data and Riemann integral of the rank curves of all subkey candidates to update each correct subkey rank before carrying out KE. We applied the proposed methods for different crypto implementations running on different devices to verify their performance. Experimental studies for both mono-channel and multi-channel leakages verified that the proposed methods were effective in improving the efficiency of KE to recover the correct key. The proposed methods are designed for processing the SCA data and can be deemed as a preliminary before executing KE. The work of this paper bridges the gap between SCA and KE.
引用
收藏
页码:54 / 61
页数:8
相关论文
共 50 条
  • [21] Analysis of Side-Channel Attack Based on Information Theory
    Mizuno, Hiroaki
    Iwai, Keisuke
    Tanaka, Hidema
    Kurokawa, Takakazu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (07) : 1523 - 1532
  • [22] Binary Classification-Based Side-Channel Analysis
    Zhang, Chi
    Lu, Xiangjun
    Gu, Dawu
    PROCEEDINGS OF THE 2021 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2021,
  • [23] Improving Deep Learning Based Second-Order Side-Channel Analysis With Bilinear CNN
    Cao, Pei
    Zhang, Chi
    Lu, Xiangjun
    Gu, Dawu
    Xu, Sen
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3863 - 3876
  • [24] Improving Deep Learning Based Second-Order Side-Channel Analysis with Bilinear CNN
    Cao, Pei
    Zhang, Chi
    Lu, Xiangjun
    Gu, Dawu
    Xu, Sen
    IEEE Transactions on Information Forensics and Security, 2022, 17 : 3863 - 3876
  • [25] On the Implementation Efficiency of Linear Regression-Based Side-Channel Attacks
    Ouladj, Maamar
    Guilley, Sylvain
    Prouff, Emmanuel
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 147 - 172
  • [26] A Key Update Scheme for Side-Channel Attack Mitigation
    Gui, Yutian
    Tamore, Suyash Mohan
    Siddiqui, Ali Shuja
    Saqib, Fareena
    2019 IEEE 16TH INTERNATIONAL CONFERENCE ON SMART CITIES: IMPROVING QUALITY OF LIFE USING ICT, IOT AND AI (IEEE HONET-ICT 2019), 2019, : 187 - 188
  • [27] Combating Side-Channel Attacks Using Key Management
    Liu, Donggang
    Dong, Qi
    2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL & DISTRIBUTED PROCESSING, VOLS 1-5, 2009, : 3131 - 3138
  • [28] A Key to Success Success Exponents for Side-Channel Distinguishers
    Guilley, Sylvain
    Heuser, Annelie
    Rioul, Olivier
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2015, 2015, 9462 : 270 - 290
  • [29] Side-channel security of practical quantum key distribution
    Jiang, Cong
    Hu, Xiao-Long
    Yu, Zong-Wen
    Wang, Xiang-Bin
    PHYSICAL REVIEW RESEARCH, 2024, 6 (01):
  • [30] Side-channel analysis of the modular inversion step in the RSA key generation algorithm
    Cabrera Aldaya, Alejandro
    Cuiman Marquez, Raudel
    Cabrera Sarmiento, Alejandro J.
    Sanchez-Solano, Santiago
    INTERNATIONAL JOURNAL OF CIRCUIT THEORY AND APPLICATIONS, 2017, 45 (02) : 199 - 213