Skip to main content

2018 | OriginalPaper | Buchkapitel

Influence of Error on Hamming Weights for ASCA

verfasst von : Chujiao Ma, John Chandy, Laurent Michel, Fanghui Liu, Waldemar Cruz

Erschienen in: Information Security and Cryptology

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Algebraic Side-Channel Attack (ASCA) models the cryptographic algorithm and side-channel leakage from the system as a set of equations and solves for the secret key. The attack has low data complexity and can succeed in unknown plaintext/ciphertext scenarios. However, it is susceptible to error and the complexity of the model may drastically increase the runtime as well as the memory consumption. In this paper, we explore the attack by examining the importance of various Hamming weights in terms of success of the attack, which also allows us to gain insights into possible areas of focus for countermeasures, as well as successfully launch ASCA on AES with a larger error tolerance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Barenghi, A., Pelosi, G., Teglia, Y.: Improving first order differential power attacks through digital signal processing. In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, pp. 124–133. ACM, New York (2010). https://doi.org/10.1145/1854099.1854126 Barenghi, A., Pelosi, G., Teglia, Y.: Improving first order differential power attacks through digital signal processing. In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, pp. 124–133. ACM, New York (2010). https://​doi.​org/​10.​1145/​1854099.​1854126
2.
Zurück zum Zitat Daemen, J., Rijmen, V.: AES - The Advanced Encryption Standard. Springer, Heidelberg (2002)MATH Daemen, J., Rijmen, V.: AES - The Advanced Encryption Standard. Springer, Heidelberg (2002)MATH
4.
Zurück zum Zitat Fei, H., Daheng, G.: Two kinds of correlation analysis method attack on implementations of advanced encryption standard software running inside STC89C52 microprocessor. In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC), pp. 1265–1269, October 2016 Fei, H., Daheng, G.: Two kinds of correlation analysis method attack on implementations of advanced encryption standard software running inside STC89C52 microprocessor. In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC), pp. 1265–1269, October 2016
6.
Zurück zum Zitat Jayasinghe, D., Ragel, R., Ambrose, J.A., Ignjatovic, A., Parameswaran, S.: Advanced modes in AES: are they safe from power analysis based side channel attacks? In: 2014 IEEE 32nd International Conference on Computer Design (ICCD), pp. 173–180, October 2014 Jayasinghe, D., Ragel, R., Ambrose, J.A., Ignjatovic, A., Parameswaran, S.: Advanced modes in AES: are they safe from power analysis based side channel attacks? In: 2014 IEEE 32nd International Conference on Computer Design (ICCD), pp. 173–180, October 2014
8.
Zurück zum Zitat Lu, Y., O’Neill, M.P., McCanny, J.V.: FPGA implementation and analysis of random delay insertion countermeasure against DPA. In: 2008 International Conference on Field-Programmable Technology, pp. 201–208, December 2008 Lu, Y., O’Neill, M.P., McCanny, J.V.: FPGA implementation and analysis of random delay insertion countermeasure against DPA. In: 2008 International Conference on Field-Programmable Technology, pp. 201–208, December 2008
9.
Zurück zum Zitat Luo, C., Fei, Y., Ding, A.A.: Side-channel power analysis of XTS-AES. In: Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1330–1335, March 2017 Luo, C., Fei, Y., Ding, A.A.: Side-channel power analysis of XTS-AES. In: Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1330–1335, March 2017
13.
Zurück zum Zitat Mpalane, K., Gasela, N., Esiefarienrhe, B.M., Tsague, H.D.: Vulnerability of advanced encryption standard algorithm to differential power analysis attacks implemented on ATmega-128 microcontroller. In: 2016 Third International Conference on Artificial Intelligence and Pattern Recognition (AIPR), pp. 1–5, September 2016 Mpalane, K., Gasela, N., Esiefarienrhe, B.M., Tsague, H.D.: Vulnerability of advanced encryption standard algorithm to differential power analysis attacks implemented on ATmega-128 microcontroller. In: 2016 Third International Conference on Artificial Intelligence and Pattern Recognition (AIPR), pp. 1–5, September 2016
16.
Zurück zum Zitat Oren, Y., Weisse, O., Wool, A.: Practical template-algebraic side channel attacks with extremely low data complexity. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2013, pp. 7:1–7:8. ACM, New York (2013). https://doi.org/10.1145/2487726.2487733 Oren, Y., Weisse, O., Wool, A.: Practical template-algebraic side channel attacks with extremely low data complexity. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2013, pp. 7:1–7:8. ACM, New York (2013). https://​doi.​org/​10.​1145/​2487726.​2487733
18.
Zurück zum Zitat Ors, S.B., Gurkaynak, F., Oswald, E., Preneel, B.: Power-analysis attack on an ASIC AES implementation. In: International Conference on Information Technology: Coding and Computing, Proceedings, ITCC 2004, vol. 2, pp. 546–552, April 2004 Ors, S.B., Gurkaynak, F., Oswald, E., Preneel, B.: Power-analysis attack on an ASIC AES implementation. In: International Conference on Information Technology: Coding and Computing, Proceedings, ITCC 2004, vol. 2, pp. 546–552, April 2004
23.
Zurück zum Zitat Standaert, F.-X., Mace, F., Peeters, E., Quisquater, J.-J.: Updates on the security of FPGAs against power analysis attacks. In: Bertels, K., Cardoso, J.M.P., Vassiliadis, S. (eds.) ARC 2006. LNCS, vol. 3985, pp. 335–346. Springer, Heidelberg (2006). https://doi.org/10.1007/11802839_42 CrossRef Standaert, F.-X., Mace, F., Peeters, E., Quisquater, J.-J.: Updates on the security of FPGAs against power analysis attacks. In: Bertels, K., Cardoso, J.M.P., Vassiliadis, S. (eds.) ARC 2006. LNCS, vol. 3985, pp. 335–346. Springer, Heidelberg (2006). https://​doi.​org/​10.​1007/​11802839_​42 CrossRef
26.
Zurück zum Zitat Standaert, O.X., Peeters, E., Rouvroy, G., Quisquater, J.J.: An overview of power analysis attacks against field programmable gate arrays. Proc. IEEE 94(2), 383–394 (2006)CrossRef Standaert, O.X., Peeters, E., Rouvroy, G., Quisquater, J.J.: An overview of power analysis attacks against field programmable gate arrays. Proc. IEEE 94(2), 383–394 (2006)CrossRef
28.
Zurück zum Zitat Zhao, X., Zhang, F., Guo, S., Wang, T., Shi, Z., Liu, H., Ji, K.: MDASCA: an enhanced algebraic side-channel attack for error tolerance and new leakage model exploitation. In: Schindler, W., Huss, S.A. (eds.) COSADE 2012. LNCS, vol. 7275, pp. 231–248. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29912-4_17 CrossRef Zhao, X., Zhang, F., Guo, S., Wang, T., Shi, Z., Liu, H., Ji, K.: MDASCA: an enhanced algebraic side-channel attack for error tolerance and new leakage model exploitation. In: Schindler, W., Huss, S.A. (eds.) COSADE 2012. LNCS, vol. 7275, pp. 231–248. Springer, Heidelberg (2012). https://​doi.​org/​10.​1007/​978-3-642-29912-4_​17 CrossRef
Metadaten
Titel
Influence of Error on Hamming Weights for ASCA
verfasst von
Chujiao Ma
John Chandy
Laurent Michel
Fanghui Liu
Waldemar Cruz
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-75160-3_26

Premium Partner