Side-Channel Analysis of Keymill

被引:1
|
作者
Dobraunig, Christoph [1 ]
Eichlseder, Maria [1 ]
Korak, Thomas [1 ]
Mendel, Florian [1 ]
机构
[1] Graz Univ Technol, Graz, Austria
基金
奥地利科学基金会;
关键词
Side-channel analysis; Fresh re-keying; Differential power analysis; IMPLEMENTATION;
D O I
10.1007/978-3-319-64647-3_9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
One prominent countermeasure against side-channel attacks, especially differential power analysis (DPA), is fresh re-keying. In such schemes, the so-called re-keying function takes the burden of protecting a cryptographic primitive against DPA. To ensure the security of the scheme against side-channel analysis, the re-keying function has to with-stand both simple power analysis (SPA) and differential power analysis (DPA). Recently, at SAC 2016, Taha et al. proposed Keymill, a side-channel resilient key generator (or re-keying function), which is claimed to be inherently secure against side-channel attacks. In this work, however, we present a DPA attack on Keymill, which is based on the dynamic power consumption of a digital circuit that is tied to the 0 -> 1 and 1 -> 0 switches of its logical gates. Hence, the power consumption of the shift-registers used in Keymill depends on the 0 -> 1 and 1 -> 0 switches of its internal state. This information is sufficient to obtain the internal differential pattern (up to a small number of bits, which have to be brute-forced) of the 4 shift-registers of Keymill after the nonce has been absorbed. This leads to a practical key-recovery attack on Keymill.
引用
收藏
页码:138 / 152
页数:15
相关论文
共 50 条
  • [31] Machine learning in side-channel analysis: a first study
    Hospodar, Gabriel
    Gierlichs, Benedikt
    De Mulder, Elke
    Verbauwhede, Ingrid
    Vandewalle, Joos
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (04) : 293 - 302
  • [32] Performance Analysis of Multilayer Perceptron in Profiling Side-Channel Analysis
    Weissbart, Leo
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 198 - 216
  • [33] On the Performance of Convolutional Neural Networks for Side-Channel Analysis
    Picek, Stjepan
    Samiotis, Ioannis Petros
    Kim, Jaehun
    Heuser, Annelie
    Bhasin, Shivam
    Legay, Axel
    [J]. SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2018, 2018, 11348 : 157 - 176
  • [34] Learning-based Side-Channel Analysis on PIPO
    Woo, Ji-Eun
    Han, Jaeseung
    Kim, Yeon-Jae
    Mun, Hye-Won
    Lim, Seonghyuck
    Lee, Tae-Ho
    An, Seong-Hyun
    Kim, Soo-Jin
    Han, Dong-Guk
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2021, 2022, 13218 : 308 - 321
  • [35] Mutual Information analysis: A generic side-channel distinguisher
    Gierlichs, Benedikt
    Batina, Lejla
    Tuyls, Pim
    Preneel, Bart
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2008, PROCEEDINGS, 2008, 5154 : 426 - 442
  • [36] A comprehensive study of deep learning for side-channel analysis
    Masure L.
    Dumas C.
    Prouff E.
    [J]. 2020, Ruhr-University of Bochum (2020): : 348 - 375
  • [37] Symbolic path cost analysis for side-channel detection
    University of California Santa Barbara, Santa Barbara
    CA, United States
    不详
    CA, United States
    [J]. ISSTA - Proc. ACM SIGSOFT Int. Symp. Softw. Test. Anal., (27-37):
  • [38] When Failure Analysis Meets Side-Channel Attacks
    Di-Battista, Jerome
    Courrege, Jean-Christophe
    Rouzeyre, Bruno
    Torres, Lionel
    Perdu, Philippe
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 188 - +
  • [39] The hydraulic analysis of side-channel spillways as reservoir outlets
    Etheridge, MJ
    [J]. JOURNAL OF THE CHARTERED INSTITUTION OF WATER AND ENVIRONMENTAL MANAGEMENT, 1996, 10 (04): : 245 - 252
  • [40] Constructive Side-Channel Analysis for Secure Hardware Design
    Herrmann, Alexander
    Stottinger, Marc
    [J]. 2014 14TH INTERNATIONAL SYMPOSIUM ON INTEGRATED CIRCUITS (ISIC), 2014, : 34 - 37