Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks

被引:0
|
作者
Lerman, Liran [1 ]
Markowitch, Olivier [1 ]
Veshchikov, Nikita [1 ]
机构
[1] Univ Libre Bruxelles, Qual & Secur Informat Syst, Brussels, Belgium
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel attacks exploit physical characteristics of implementations of cryptographic algorithms in order to extract sensitive information such as the secret key. These physical attacks are among the most powerful attacks against real-world crypto-systems. This paper analyses the non-linear part (called Sboxes) of ciphers, which is often targeted by implementation attacks. We analyse Sboxes of several candidates that were submitted to the competition on authenticated encryption (CAESAR) as well as several other ciphers. We compare theoretical metrics with results from simulations and with real experiments. In this paper, we demonstrate that, in some contexts, the theoretical metrics provide no information on the resiliency of the Sboxes against side-channel attacks.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Soft Analytical Side-Channel Attacks
    Veyrat-Charvillon, Nicolas
    Gerard, Benoit
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 282 - 296
  • [22] Cache Side-Channel Attacks and Defenses
    Zhang W.
    Bai L.
    Ling Y.
    Lan X.
    Jia X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222
  • [23] A Look into SIMON from a Side-Channel Perspective
    Bhasin, Shivam
    Graba, Tarik
    Danger, Jean-Luc
    Najm, Zakaria
    2014 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), 2014, : 56 - 59
  • [24] Extracting Side-Channel Leakage from Round Unrolled Implementations of Lightweight Ciphers
    Chawla, Nikhil
    Singh, Arvind
    Rahman, Neel Mizanur
    Kar, Monodeep
    Mukhopadhyay, Saibal
    PROCEEDINGS OF THE 2019 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2019, : 31 - 40
  • [25] Protecting Encrypted Cookies from Compression Side-Channel Attacks
    Alawatugoda, Janaka
    Stebila, Douglas
    Boyd, Colin
    Financial Cryptography and Data Security (FC 2015), 2015, 8975 : 86 - 106
  • [26] Combining Algebraic and Side Channel Attacks on Stream Ciphers
    Kazmi, Asif Raza
    Afzal, Mehreen
    Amjad, Muhammad Faisal
    Rashdi, Adnan
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 138 - 142
  • [27] A gradient deconvolutional network for side-channel attacks
    Li, Yanbin
    Huang, Yuxin
    Jia, Fuwei
    Zhao, Qingsong
    Tang, Ming
    Ren, Shougang
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 98
  • [28] Remote Side-Channel Attacks on Anonymous Transactions
    Tramer, Florian
    Boneh, Dan
    Paterson, Kenneth G.
    PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 2739 - 2756
  • [29] Side-Channel Attacks on Mobile and Wearable Systems
    Nahapetian, Ani
    2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2016,
  • [30] A Survey of Side-Channel Attacks on Caches and Countermeasures
    Yangdi Lyu
    Prabhat Mishra
    Journal of Hardware and Systems Security, 2018, 2 (1) : 33 - 50