Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power Analysis

作者: Christophe Clavier , Quentin Isorez , Antoine Wurcker

DOI: 10.1007/978-3-319-03515-4_8

关键词:

摘要: Despite Kerckhoffs's principle, proprietary or otherwise secret cryptographic algorithms are still used in real life. For security and efficiency reasons a common design practice simply modifies some parameters of widely well studied encryption standards. In this paper, we investigate the feasibility reverse engineering specifications an AES-like block cipher by SCARE techniques based on collision power analysis. considered observational model, demonstrate that adversary who does not know key can recover full set software implementation even if it is protected first-order Boolean masking shuffling independent operations. We study possible countermeasures recall simple guidelines to mitigate side-channel information with aim thwart our attacks.

参考文章(33)
Julien Iguchi-Cartigny, Jean-Louis Lanet, Dieter Gollmann, Smart Card Research and Advanced Application ,(2011)
Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar, A Collision-Attack on AES Lecture Notes in Computer Science. pp. 163- 175 ,(2004) , 10.1007/978-3-540-28632-5_12
HeeSeok Kim, Seokhie Hong, Jongin Lim, A fast and provably secure higher-order masking of AES S-box cryptographic hardware and embedded systems. pp. 95- 107 ,(2011) , 10.1007/978-3-642-23951-9_7
Patrick Felke, Christof Paar, Gregor Leander, Kai Schramm, A Collision-Attack on AES Combining Side Channel- and Differential-Attack cryptographic hardware and embedded systems. pp. 163- 175 ,(2004)
Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylène Roussellet, Vincent Verneuil, Improved collision-correlation power analysis on first order protected AES cryptographic hardware and embedded systems. ,vol. 6917, pp. 49- 62 ,(2011) , 10.1007/978-3-642-23951-9_4
Matthieu Rivain, Thomas Roche, SCARE of Secret Ciphers with SPN Structures international cryptology conference. pp. 526- 544 ,(2013) , 10.1007/978-3-642-42033-7_27
Kai Schramm, Thomas Wollinger, Christof Paar, A New Class of Collision Attacks and Its Application to DES Fast Software Encryption. pp. 206- 222 ,(2003) , 10.1007/978-3-540-39887-5_16
Aggelos Kiayias, Moti Yung, Polynomial reconstruction based cryptography selected areas in cryptography. pp. 129- 133 ,(2001) , 10.1007/3-540-45537-X_10
Roman Novak, Sign-Based Differential Power Analysis workshop on information security applications. pp. 203- 216 ,(2003) , 10.1007/978-3-540-24591-9_16
Roman Novak, Side-Channel Attack on Substitution Blocks applied cryptography and network security. pp. 307- 318 ,(2003) , 10.1007/978-3-540-45203-4_24