Side-Channel Analysis of Keymill

被引:1
|
作者
Dobraunig, Christoph [1 ]
Eichlseder, Maria [1 ]
Korak, Thomas [1 ]
Mendel, Florian [1 ]
机构
[1] Graz Univ Technol, Graz, Austria
基金
奥地利科学基金会;
关键词
Side-channel analysis; Fresh re-keying; Differential power analysis; IMPLEMENTATION;
D O I
10.1007/978-3-319-64647-3_9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
One prominent countermeasure against side-channel attacks, especially differential power analysis (DPA), is fresh re-keying. In such schemes, the so-called re-keying function takes the burden of protecting a cryptographic primitive against DPA. To ensure the security of the scheme against side-channel analysis, the re-keying function has to with-stand both simple power analysis (SPA) and differential power analysis (DPA). Recently, at SAC 2016, Taha et al. proposed Keymill, a side-channel resilient key generator (or re-keying function), which is claimed to be inherently secure against side-channel attacks. In this work, however, we present a DPA attack on Keymill, which is based on the dynamic power consumption of a digital circuit that is tied to the 0 -> 1 and 1 -> 0 switches of its logical gates. Hence, the power consumption of the shift-registers used in Keymill depends on the 0 -> 1 and 1 -> 0 switches of its internal state. This information is sufficient to obtain the internal differential pattern (up to a small number of bits, which have to be brute-forced) of the 4 shift-registers of Keymill after the nonce has been absorbed. This leads to a practical key-recovery attack on Keymill.
引用
收藏
页码:138 / 152
页数:15
相关论文
共 50 条
  • [41] Side-Channel Power Analysis of XTS-AES
    Luo, Chao
    Fei, Yunsi
    Ding, A. Adam
    [J]. PROCEEDINGS OF THE 2017 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2017, : 1330 - 1335
  • [42] Symbolic Path Cost Analysis for Side-Channel Detection
    Brennan, Tegan
    Saha, Seemanta
    Bultan, Tevfik
    Pasareanu, Corina S.
    [J]. ISSTA'18: PROCEEDINGS OF THE 27TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, 2018, : 27 - 37
  • [43] On-Chip Side-Channel Analysis of the Loop PUF
    Tebelmann, Lars
    Wettermann, Moritz
    Pehl, Michael
    [J]. PROCEEDINGS OF THE 2022 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY, ASHES 2022, 2022, : 55 - 63
  • [44] Side-Channel Analysis on Blinded Regular Scalar Multiplications
    Feix, Benoit
    Roussellet, Mylene
    Venelli, Alexandre
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2014, 2014, 8885 : 3 - 20
  • [45] Power Side-Channel Analysis for Different Adders on FPGA
    Zhao, Yilin
    Zhang, Qidi
    Nishikawa, Hiroki
    Kong, Xiangbo
    Tomiyama, Hiroyuki
    [J]. 18TH INTERNATIONAL SOC DESIGN CONFERENCE 2021 (ISOCC 2021), 2021, : 367 - 368
  • [46] Side-Channel Analysis and Machine Learning: A Practical Perspective
    Picek, Stjepan
    Heuser, Annelie
    Jovic, Alan
    Ludwig, Simone A.
    Guilley, Sylvain
    Jakobovic, Domagoj
    Mentens, Nele
    [J]. 2017 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2017, : 4095 - 4102
  • [47] Side-channel analysis - Mathematics has met engineering
    Schindler W.
    [J]. Lecture Notes in Electrical Engineering, 2010, 78 : 43 - 62
  • [48] Hypothesis Testing Based Side-Channel Collision Analysis
    Zheng, Dong
    Jia, Xiang
    Zhang, Meiling
    [J]. IEEE ACCESS, 2019, 7 : 104218 - 104227
  • [49] KeeLoq and Side-Channel Analysis-Evolution of an Attack
    Paar, Christof
    Eisenbarth, Thomas
    Kasper, Markus
    Kasper, Timo
    Moradi, Amir
    [J]. 2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 65 - 69
  • [50] SCAUL: Power Side-Channel Analysis With Unsupervised Learning
    Ramezanpour, Keyvan
    Ampadu, Paul
    Diehl, William
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2020, 69 (11) : 1626 - 1638