Side-Channel Analysis of Keymill

被引:1
|
作者
Dobraunig, Christoph [1 ]
Eichlseder, Maria [1 ]
Korak, Thomas [1 ]
Mendel, Florian [1 ]
机构
[1] Graz Univ Technol, Graz, Austria
基金
奥地利科学基金会;
关键词
Side-channel analysis; Fresh re-keying; Differential power analysis; IMPLEMENTATION;
D O I
10.1007/978-3-319-64647-3_9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
One prominent countermeasure against side-channel attacks, especially differential power analysis (DPA), is fresh re-keying. In such schemes, the so-called re-keying function takes the burden of protecting a cryptographic primitive against DPA. To ensure the security of the scheme against side-channel analysis, the re-keying function has to with-stand both simple power analysis (SPA) and differential power analysis (DPA). Recently, at SAC 2016, Taha et al. proposed Keymill, a side-channel resilient key generator (or re-keying function), which is claimed to be inherently secure against side-channel attacks. In this work, however, we present a DPA attack on Keymill, which is based on the dynamic power consumption of a digital circuit that is tied to the 0 -> 1 and 1 -> 0 switches of its logical gates. Hence, the power consumption of the shift-registers used in Keymill depends on the 0 -> 1 and 1 -> 0 switches of its internal state. This information is sufficient to obtain the internal differential pattern (up to a small number of bits, which have to be brute-forced) of the 4 shift-registers of Keymill after the nonce has been absorbed. This leads to a practical key-recovery attack on Keymill.
引用
收藏
页码:138 / 152
页数:15
相关论文
共 50 条
  • [1] On XTR and side-channel analysis
    Page, Daniel
    Stam, Martijn
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3357 : 54 - 68
  • [2] On XTR and side-channel analysis
    Page, D
    Stam, M
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 54 - 68
  • [3] Federated Learning in Side-Channel Analysis
    Wang, Huanyu
    Dubrova, Elena
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2020, 2021, 12593 : 257 - 272
  • [4] Side-Channel Analysis of the TERO PUF
    Tebelmann, Lars
    Pehl, Michael
    Immler, Vincent
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 43 - 60
  • [5] Abacus: Precise Side-Channel Analysis
    Bao, Qinkun
    Wang, Zihao
    Li, Xiaoting
    Larus, James R.
    Wu, Dinghao
    [J]. 2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2021), 2021, : 797 - 809
  • [6] Use of simulators for side-channel analysis
    Veshchikov, Nikita
    Guilley, Sylvain
    [J]. 2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, : 51 - 59
  • [7] Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
    Chevallier-Mames, B
    Ciet, M
    Joye, M
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2004, 53 (06) : 760 - 768
  • [8] Weakly Profiling Side-channel Analysis
    Wu, Lichao
    Perin, Guilherme
    Picek, Stjepan
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (03): : 707 - 730
  • [9] Use of simulators for side-channel analysis
    Veshchikov, Nikita
    Guilley, Sylvain
    [J]. 2017 2ND IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW), 2017, : 104 - 112
  • [10] Side-channel analysis of SEcube™ platform
    Bollo, Matteo
    Carelli, Alberto
    Di Carlo, Stefano
    Prinetto, Paolo
    [J]. 2017 IEEE EAST-WEST DESIGN & TEST SYMPOSIUM (EWDTS), 2017,