Amplifying side-channel attacks with techniques from block cipher cryptanalysis

被引:0
|
作者
Phan, Raphael C. -W.
Yen, Sung-Ming
机构
[1] Swinburne Univ Technol, ISECURES Lab, Kuching, Malaysia
[2] Natl Cent Univ, Dept Comp Sci & Informat Engn, LCIS, Chungli 320, Taiwan
关键词
attacks and countermeasures in hardware and software; side-channel attacks; cryptanalysis; fault attacks; Advanced Encryption Standard;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce the notion of amplified side-channel attacks, i.e. the application of block cipher cryptanalysis techniques to amplify effects exploitable by side-channel attacks. Such an approach is advantageous since it fully exploits the special characteristics of each technique in situations where each thrives the most. As an example, we consider the integration of block cipher cryptanalysis techniques into a particular type of side-channel attack, the differential fault attack (DFA). In more detail, we apply the DFA on the AES key schedule or on intermediate states within the AES and then exploit distinguishers based on Square attacks and impossible differential cryptanalysis to cover the remaining rounds. The use of techniques from conventional differential cryptanalysis in DFAs is not new; however, to the best of our knowledge, more advanced differential-like attack techniques have so far not been applied in collaboration with DFA. Purther, while previous DFA attacks can only be mounted if faults are induced in the last or first (but with more restrictions) few rounds, our attacks alternatively show that even when faults are induced into some middle rounds, the DFA attacks still work, complementing existing results in literature; and thus showing that DFA attacks work regardless of where faults are induced. This is of importance because redundancy is a costly countermeasure against DFA and thus it is vital to study which rounds have to be protected. We hope that this completes the picture on the applicability of DFAs to block ciphers, and motivates thoughts into applying other advanced block cipher cryptanalysis techniques into other types of side-channel attacks.
引用
收藏
页码:135 / 150
页数:16
相关论文
共 50 条
  • [31] Synthesis of Adaptive Side-Channel Attacks
    Quoc-Sang Phan
    Bang, Lucas
    Pasareanu, Corina S.
    Malacaria, Pasquale
    Bultan, Tevfik
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 328 - 342
  • [32] Side-Channel Attacks in a Real Scenario
    Tang, Ming
    Luo, Maixing
    Zhou, Junfeng
    Yang, Zhen
    Guo, Zhipeng
    Yan, Fei
    Liu, Liang
    TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 586 - 598
  • [33] Side-Channel Attacks on Cryptographic Software
    Lawson, Nate
    IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68
  • [34] Optimal Collision Side-Channel Attacks
    Glowacz, Cezary
    Grosso, Vincent
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019, 2020, 11833 : 126 - 140
  • [35] Side-Channel Attacks: A Short Tour
    Piessens, Frank
    van Oorschot, Paul C.
    Piessens, Frank
    van Oorshot, Paul C.
    IEEE SECURITY & PRIVACY, 2024, 22 (02) : 75 - 80
  • [36] Soft Analytical Side-Channel Attacks
    Veyrat-Charvillon, Nicolas
    Gerard, Benoit
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 282 - 296
  • [37] Cache Side-Channel Attacks and Defenses
    Zhang W.
    Bai L.
    Ling Y.
    Lan X.
    Jia X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222
  • [38] Scan-Based Side-Channel Attack on the Camellia Block Cipher Using Scan Signatures
    Jiang, Huiqian
    Fujishiro, Mika
    Kodera, Hirokazu
    Yanagisawa, Masao
    Togawa, Nozomu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (12): : 2547 - 2555
  • [39] A Side-channel Analysis Resistant Reconfigurable Cryptographic Coprocessor Supporting Multiple Block Cipher Algorithms
    Shan, Weiwei
    Shi, Longxing
    Fu, Xingyuan
    Zhang, Xiao
    Tian, Chaoxuan
    Xu, Zhipeng
    Yang, Jun
    Li, Jie
    2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
  • [40] Scan-Based Side-Channel Attack on the LED Block Cipher Using Scan Signatures
    Fujishiro, Mika
    Yanagisawa, Masao
    Togawa, Nozomu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (12): : 2434 - 2442