Improving Efficiency of Key Enumeration Based on Side-Channel Analysis

被引:0
|
作者
Yang, Wei [1 ]
Fu, Anmin [1 ]
Zhang, Hailong [2 ]
Huang, Chanying [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
基金
中国国家自然科学基金;
关键词
Security evaluation; side-channel analysis; key enumeration; key rank; multi-channel leakages;
D O I
10.1109/TrustCom50675.2020.00021
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel analysis (SCA) is usually used for analyzing the side-channel resistance of a crypto device. However, it does not mean "practical secure" when a SCA attack fails since SCA only provides a success or failure conclusion. On the basis of the SCA data about scores and ranks of all candidates for each subkey, it is still possible to apply key enumeration (KE) algorithms to search the correct master key at an affordable overhead. Nevertheless, the efficiency of KE is limited by the SCA data in essence. To address the issue, we proposed two methods to exploit the SCA data and Riemann integral of the rank curves of all subkey candidates to update each correct subkey rank before carrying out KE. We applied the proposed methods for different crypto implementations running on different devices to verify their performance. Experimental studies for both mono-channel and multi-channel leakages verified that the proposed methods were effective in improving the efficiency of KE to recover the correct key. The proposed methods are designed for processing the SCA data and can be deemed as a preliminary before executing KE. The work of this paper bridges the gap between SCA and KE.
引用
收藏
页码:54 / 61
页数:8
相关论文
共 50 条
  • [31] EM Side-Channel Analysis of BCH-based Error Correction for PUF-based Key Generation
    Tebelmann, Lars
    Pehl, Michael
    Sigl, Georg
    PROCEEDINGS OF THE 2017 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY (ASHES'17), 2017, : 43 - 52
  • [32] Federated Learning in Side-Channel Analysis
    Wang, Huanyu
    Dubrova, Elena
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2020, 2021, 12593 : 257 - 272
  • [33] Side-Channel Analysis of the TERO PUF
    Tebelmann, Lars
    Pehl, Michael
    Immler, Vincent
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 43 - 60
  • [34] Preventing Scan-Based Side-Channel Attacks Through Key Masking
    Ahlawat, Satyadev
    Vaghani, Darshit
    Singh, Virendra
    2017 IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFT), 2017, : 35 - 38
  • [35] Focus is Key to Success: A Focal Loss Function for Deep Learning-Based Side-Channel Analysis
    Kerkhof, Maikel
    Wu, Lichao
    Perin, Guilherme
    Picek, Stjepan
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2022, 2022, 13211 : 29 - 48
  • [36] Abacus: Precise Side-Channel Analysis
    Bao, Qinkun
    Wang, Zihao
    Li, Xiaoting
    Larus, James R.
    Wu, Dinghao
    2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2021), 2021, : 797 - 809
  • [37] Use of simulators for side-channel analysis
    Veshchikov, Nikita
    Guilley, Sylvain
    2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, : 51 - 59
  • [38] Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
    Chevallier-Mames, B
    Ciet, M
    Joye, M
    IEEE TRANSACTIONS ON COMPUTERS, 2004, 53 (06) : 760 - 768
  • [39] Side-channel analysis of SEcube™ platform
    Bollo, Matteo
    Carelli, Alberto
    Di Carlo, Stefano
    Prinetto, Paolo
    2017 IEEE EAST-WEST DESIGN & TEST SYMPOSIUM (EWDTS), 2017,
  • [40] Weakly Profiling Side-channel Analysis
    Wu, Lichao
    Perin, Guilherme
    Picek, Stjepan
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (03): : 707 - 730