DES with any reduced masked rounds is not secure against side-channel attacks

被引:7
|
作者
Kim, Jongsung [2 ]
Lee, Yuseop [1 ]
Lee, Sangjin [1 ]
机构
[1] Korea Univ, CIST, Seoul, South Korea
[2] Kyungnam Univ, Div E Business, Masan, South Korea
关键词
Side-channel attacks; Differentials; DES;
D O I
10.1016/j.camwa.2010.01.011
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The literature offers several efficient masking methods for providing resistance to side-channel attacks against iterative block ciphers, such as Data Encryption Standard (DES) and Advanced Encryption Standard (AES). One of the proposed methods is to apply independent masks to each of the first and last few rounds. However, at the workshops on Selected Areas in Cryptography (SAC) 2006 and Cryptographic Hardware and Embedded System (CHES) 2007, Handschuh-Preneel and Biryukov-Khovratovich showed that DES and AES with such reduced masked rounds are still vulnerable to side-channel attacks combined with block cipher cryptanalysis. Specifically, Handschuh and Preneel presented differential based side-channel attacks on DES with the first 4 rounds masked, and Biryukov and Khovratovich presented impossible and multiset collision based side-channel attacks on AES with the first 2, 3 and 4 rounds masked. More recently, Kim and Hong showed that AES-192 and AES-256 with the first 5 rounds masked are also vulnerable to side-channel attacks based on the meet-in-the-middle technique. In this paper, we focus on the security of DES with reduced masked rounds against side-channel attacks; we propose differential based side-channel attacks on DES with the first 5, 6 and 7 rounds masked: they require 2(17.4), 2(24), 2(35.5) chosen plaintexts with associate power traces and collision measurements, correspondingly. Our attacks are the first known side-channel attacks on DES with the first 5, 6 and 7 rounds masked: our attack results show that DES with any reduced masked rounds is not secure against side-channel attacks, i.e., in order for DES to be resistant to side-channel attacks, entire rounds should be masked. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:347 / 354
页数:8
相关论文
共 50 条
  • [41] Algebraic Side-Channel Attacks
    Renauld, Mathieu
    Standaert, Francois-Xavier
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 393 - 410
  • [42] On the Detection of Side-Channel Attacks
    Vateva-Gurova, Tsvetoslava
    Suri, Neeraj
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 185 - 186
  • [43] A Compact AES Hardware Implementation Secure against 1st-Order Side-Channel Attacks
    Zhang, Qian
    Zhou, Yongbin
    Qiu, Shuang
    Cheng, Wei
    Ming, Jingdian
    Zhang, Rui
    2018 IEEE 36TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2018, : 545 - 552
  • [44] A Memristor-based Secure Scan Design against the Scan-based Side-Channel Attacks
    Lu, Mengqiang
    Cui, Aijiao
    Shao, Yan
    Qu, Gang
    PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022, 2022, : 71 - 76
  • [45] HANMRE - An authenticated encryption secure against side-channel attacks for nonce-misuse and lightweight approaches
    Song Dat Phuc Tran
    Seok, Byoungjin
    Lee, Changhoon
    APPLIED SOFT COMPUTING, 2020, 97 (97)
  • [46] Practical Side-Channel Attacks against WPA-TKIP
    Schepers, Domien
    Ranganathan, Aanjhan
    Vanhoef, Mathy
    PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 415 - 426
  • [47] A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks
    Abdulgadir, Abubakr
    Mohajerani, Kamyar
    Dang, Viet Ba
    Kaps, Jens-Peter
    Gaj, Kris
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 224 - 245
  • [48] Hardening Embedded Networking Devices Against Side-Channel Attacks
    Liu, Donggang
    Dong, Qi
    AD HOC & SENSOR WIRELESS NETWORKS, 2011, 12 (1-2) : 103 - 124
  • [49] FPGA implementations of SPRING and their countermeasures against side-channel attacks
    Brenner, Hai
    Gaspar, Lubos
    Leurent, Gaëetan
    Rosen, Alon
    Standaert, François-Xavier
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8731 : 414 - 432
  • [50] Temporal Power Redistribution as a Countermeasure Against Side-Channel Attacks
    Zooker, David
    Elkoni, Matan
    Shalom, Or Ohev
    Weizman, Yoav
    Levi, Itamar
    Keren, Osnat
    Fish, Alexander
    2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,