On recovering block cipher secret keys in the cold boot attack setting

被引:0
|
作者
Banegas, Gustavo [1 ,2 ]
Villanueva-Polanco, Ricardo [3 ]
机构
[1] Inst Polytech Paris, Inria, Palaiseau, France
[2] Inst Polytech Paris, Lab Informat Ecole Polytech, Palaiseau, France
[3] Univ Norte, Dept Comp Sci & Engn, KM 5 Via Puerto Colombia, Barranquilla 081007, Colombia
关键词
Cold boot attacks; Grover's quantum algorithm; Key enumeration; Key recovery; Post-quantum signature schemes; Side-channel attacks; ENUMERATION; SEARCH;
D O I
10.1007/s12095-022-00625-z
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a general strategy to recover a block cipher secret key in the cold boot attack setting. More precisely, we propose a key-recovery method that combines key enumeration algorithms and Grover's quantum algorithm to recover a block cipher secret key after an attacker has procured a noisy version of it via a cold boot attack. We also show how to implement the quantum component of our algorithm for several block ciphers such as AES, PRESENT and GIFT, and LowMC. Additionally, since evaluating the third-round post-quantum candidates of the National Institute of Standards and Technology (NIST) post-quantum standardization process against different attack vectors is of great importance for their overall assessment, we show the feasibility of performing our hybrid attack on Picnic, a post-quantum signature algorithm being an alternate candidate in the NIST post-quantum standardization competition. According to our results, our method may recover the Picnic private key for all Picnic parameter sets, tolerating up to 40% of noise for some of the parameter sets. Furthermore, we provide a detailed analysis of our method by giving the cost of its resources, its running time, and its success rate for various enumerations.
引用
收藏
页码:311 / 335
页数:25
相关论文
共 50 条
  • [31] A compress slide attack on the full GOST block cipher
    Lu, Linzhen
    Chen, Shaozhen
    INFORMATION PROCESSING LETTERS, 2013, 113 (17) : 634 - 639
  • [32] Differential attack on nine rounds of the SEED block cipher
    Lu, Jiqiang
    Yap, Wun-She
    Henricksen, Matt
    Heng, Swee-Huay
    INFORMATION PROCESSING LETTERS, 2014, 114 (03) : 116 - 123
  • [33] A Statistical Saturation Attack against the Block Cipher PRESENT
    Collard, B.
    Standaert, F-X.
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 195 - 210
  • [34] New Rectangle Attack Against SKINNY Block Cipher
    Zhang, Jiyan
    Cui, Ting
    Jin, Chenhui
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT III, 2021, 12939 : 399 - 409
  • [35] Lest We Remember: Cold-Boot Attacks on Encryption Keys
    Halderman, J. Alex
    Schoen, Seth D.
    Heninger, Nadia
    Clarkson, William
    Paul, William
    Calandrino, Joseph A.
    Feldman, Ariel J.
    Appelbaum, Jacob
    Felten, Edward W.
    COMMUNICATIONS OF THE ACM, 2009, 52 (05) : 91 - 98
  • [36] Differential Fault Attack on the Lightweight Block Cipher PUFFIN
    Yuan Qingjun
    Zhang Xuncheng
    Gao Yang
    Wang Yongjuan
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (06) : 1519 - 1525
  • [37] Differential Fault Attack on Lightweight Block Cipher PIPO
    Lim, Seonghyuck
    Han, Jaeseung
    Lee, Tae-Ho
    Han, Dong-Guk
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2022, 13218 LNCS : 296 - 307
  • [38] Weak Keys and Plaintext Recovery for the Dhall-Pal Block Cipher
    Korstanje, Karen
    Keliher, Liam
    2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2015, : 816 - 821
  • [39] ICT: A Cryptanalysis Toolbox for Block Cipher Structure With Secret Components
    Zhang, Jiyan
    Cui, Ting
    Jin, Chenhui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4482 - 4493
  • [40] The secret-key block cipher MKC1
    Matsukawa, K
    Kobayashi, K
    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART II-ELECTRONICS, 2003, 86 (02): : 68 - 83