On recovering block cipher secret keys in the cold boot attack setting

被引:0
|
作者
Banegas, Gustavo [1 ,2 ]
Villanueva-Polanco, Ricardo [3 ]
机构
[1] Inst Polytech Paris, Inria, Palaiseau, France
[2] Inst Polytech Paris, Lab Informat Ecole Polytech, Palaiseau, France
[3] Univ Norte, Dept Comp Sci & Engn, KM 5 Via Puerto Colombia, Barranquilla 081007, Colombia
关键词
Cold boot attacks; Grover's quantum algorithm; Key enumeration; Key recovery; Post-quantum signature schemes; Side-channel attacks; ENUMERATION; SEARCH;
D O I
10.1007/s12095-022-00625-z
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a general strategy to recover a block cipher secret key in the cold boot attack setting. More precisely, we propose a key-recovery method that combines key enumeration algorithms and Grover's quantum algorithm to recover a block cipher secret key after an attacker has procured a noisy version of it via a cold boot attack. We also show how to implement the quantum component of our algorithm for several block ciphers such as AES, PRESENT and GIFT, and LowMC. Additionally, since evaluating the third-round post-quantum candidates of the National Institute of Standards and Technology (NIST) post-quantum standardization process against different attack vectors is of great importance for their overall assessment, we show the feasibility of performing our hybrid attack on Picnic, a post-quantum signature algorithm being an alternate candidate in the NIST post-quantum standardization competition. According to our results, our method may recover the Picnic private key for all Picnic parameter sets, tolerating up to 40% of noise for some of the parameter sets. Furthermore, we provide a detailed analysis of our method by giving the cost of its resources, its running time, and its success rate for various enumerations.
引用
收藏
页码:311 / 335
页数:25
相关论文
共 50 条
  • [21] An Enhanced Key Schedule Algorithm of PRESENT-128 Block Cipher for Random and Non-Random Secret Keys
    Imdad, Maria
    Ramli, Sofia Najwa
    Mahdin, Hairulnizam
    SYMMETRY-BASEL, 2022, 14 (03):
  • [22] Cold Boot Attack Methods for the Discrete Logarithm Problem
    Ying, Hwei-Ming
    Kunihiro, Noboru
    2016 FOURTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2016, : 154 - 160
  • [23] Cold Boot Attack on Encrypted Containers for Forensic Investigations
    Twum, Frimpong
    Lagoh, Emmanuel Mawuli
    Missah, Yaw
    Ussiph, Najim
    Ahene, Emmanuel
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2022, 16 (09): : 3068 - 3086
  • [24] Similarity Property and Slide Attack of Block Cipher FESH
    Zheng, Yafei
    Wu, Wenling
    IET INFORMATION SECURITY, 2023, 2023 (01)
  • [25] Differential Fault Attack on Lightweight Block Cipher PIPO
    Lim, Seonghyuck
    Han, Jaeseung
    Lee, Tae-Ho
    Han, Dong-Guk
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2021, 2022, 13218 : 296 - 307
  • [26] Meet-in-the-middle attack on TWINE block cipher
    Wang, Yan-Feng
    Wu, Wen-Ling
    Ruan Jian Xue Bao/Journal of Software, 2015, 26 (10): : 2684 - 2695
  • [27] Power Attack and Protected Implementation on Block Cipher BIG
    Gao, Jixiang
    Gu, Lize
    Sun, Bin
    2020 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, COMPUTER TECHNOLOGY AND TRANSPORTATION (ISCTT 2020), 2020, : 386 - 391
  • [28] Electromagnetic Analysis Attack for a Lightweight Block Cipher TWINE
    Yoshikawa, Masava
    Nozaki, Yusukc
    Asahi, Kcnsaku
    2016 IEEE/ACES INTERNATIONAL CONFERENCE ON WIRELESS INFORMATION TECHNOLOGY AND SYSTEMS (ICWITS) AND APPLIED COMPUTATIONAL ELECTROMAGNETICS (ACES), 2016,
  • [29] Improved Differential Fault Attack on the Block Cipher SPECK
    Huo, Yuming
    Zhang, Fan
    Feng, Xiutao
    Wang, Li-Ping
    2015 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC), 2015, : 28 - 34
  • [30] Differential Collision Attack on Reduced FOX Block Cipher
    Chen Jie
    Hu Yupu
    Zhang Yueyu
    Dong Xiaoli
    CHINA COMMUNICATIONS, 2012, 9 (07) : 71 - 76