Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA

被引:0
|
作者
Renauld, Mathieu [1 ]
Standaert, Francois-Xavier [1 ]
Veyrat-Charvillon, Nicolas [1 ]
机构
[1] Catholic Univ Louvain, UCL Crypto Grp, B-1348 Louvaine La Neuve, Belgium
关键词
COLLISION ATTACKS; BLOCK CIPHERS; CRYPTANALYSIS; IMPLEMENTATIONS; EQUATIONS; SYSTEMS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Algebraic side-channel attacks have been recently introduced as a powerful cryptanalysis technique against block ciphers. These attacks represent both a target algorithm and its physical information leakages as an overdefined system of equations that the adversary tries to solve. They were first applied to PRESENT because of its simple algebraic structure. In this paper, we investigate the extent to which they can be exploited against; the AES Rijndael and discuss their practical specificities. We show experimentally that most of the intuitions that hold for PRESENT can also be observed for an unprotected implementation of Rijndael in an 8-bit controller. Namely, algebraic side-channel attacks can recover the AES master key with the observation of a single encrypted plaintext and they easily deal with unknown plaintexts/ciphertexts in this context. Because these attacks can take advantage of the physical information corresponding to all the cipher rounds, they imply that one cannot trade speed for code size (or gate count) without affecting the physical security of a leaking device. In other words, more intermediate computations inevitably leads to more exploitable leakages. We analyze the consequences of this observation on two different masking schemes and discuss its impact on other countermeasures. Our results exhibit that algebraic techniques lead to a new understanding of implementation weaknesses that is different; than classical side-channel attacks.
引用
收藏
页码:97 / 111
页数:15
相关论文
共 50 条
  • [1] Algebraic Side-Channel Attacks
    Renauld, Mathieu
    Standaert, Francois-Xavier
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 393 - 410
  • [2] Improved algebraic side-channel attack on AES
    Mohamed, Mohamed Saied Emam
    Bulygin, Stanislav
    Zohner, Michael
    Heuser, Annelie
    Walter, Michael
    Buchmann, Johannes
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (03) : 139 - 156
  • [3] Improved side-channel collision attacks on AES
    Bogdanov, Andrey
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 84 - 95
  • [4] Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
    Clavier, Christophe
    Danger, Jean-Luc
    Duc, Guillaume
    Elaabid, M. Abdelaziz
    Gerard, Benoit
    Guilley, Sylvain
    Heuser, Annelie
    Kasper, Michael
    Li, Yang
    Lomne, Victor
    Nakatsu, Daisuke
    Ohta, Kazuo
    Sakiyama, Kazuo
    Sauvage, Laurent
    Schindler, Werner
    Stottinger, Marc
    Veyrat-Charvillon, Nicolas
    Walle, Matthieu
    Wurcker, Antoine
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2014, 4 (04) : 259 - 274
  • [5] Beyond the Limits of DPA: Combined Side-Channel Collision Attacks
    Bogdanov, Andrey
    Kizhvatov, Ilya
    IEEE TRANSACTIONS ON COMPUTERS, 2012, 61 (08) : 1153 - 1164
  • [6] Side-Channel Attacks on Masked Bitsliced Implementations of AES
    Radulescu, Anca
    Choudary, Marios O.
    CRYPTOGRAPHY, 2022, 6 (03)
  • [7] Practical Algebraic Side-Channel Attacks Against ACORN
    Adomnicai, Alexandre
    Masson, Laurent
    Fournier, Jacques J. A.
    INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 325 - 340
  • [8] Algebraic side-channel attacks on Trivium stream cipher
    Sun, Wenlong
    Guan, Jie
    IET COMMUNICATIONS, 2024, 18 (19) : 1335 - 1347
  • [9] A Complete Tolerant Algebraic Side-Channel Attack for AES with CP
    Liu, Fanghui
    Cruz, Waldemar
    Michel, Laurent
    PRINCIPLES AND PRACTICE OF CONSTRAINT PROGRAMMING, 2018, 11008 : 259 - 275
  • [10] A Tolerant Algebraic Side-Channel Attack on AES Using CP
    Liu, Fanghui
    Cruz, Waldemar
    Ma, Chujiao
    Johnson, Greg
    Michel, Laurent
    PRINCIPLES AND PRACTICE OF CONSTRAINT PROGRAMMING (CP 2017), 2017, 10416 : 189 - 205