On Side Channel Vulnerabilities of Bit Permutations in Cryptographic Algorithms

被引:8
|
作者
Breier, Jakub [1 ]
Jap, Dirmanto [2 ]
Hou, Xiaolu [3 ]
Bhasin, Shivam [2 ]
机构
[1] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore 639798, Singapore
[2] Nanyang Technol Univ, Temasek Labs, Phys Anal & Cryptog Engn Lab, Singapore 637553, Singapore
[3] Natl Univ Singapore, Sch Comp, Singapore 119077, Singapore
基金
新加坡国家研究基金会;
关键词
Block ciphers; side-channel attacks; bit permutations; implementation attacks; ATTACK;
D O I
10.1109/TIFS.2019.2932230
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Lightweight block ciphers rely on simple operations to allow compact implementation. Thanks to its efficiency, bit permutation has emerged as an optimal choice for state-wise diffusion. It can be implemented by simple wiring in hardware or shifts in software. However, efficiency and security often go against each other. In this paper, we show how bit permutations introduce a side-channel vulnerability that can be exploited to extract the secret key from the cipher. Such vulnerabilities are specific to bit permutations and do not occur in other state-wise diffusion alternatives. We propose side-channel assisted differential-plaintext attack (SCADPA) which targets this vulnerability in the bit permutation operation. SCADPA is first experimentally demonstrated on PRESENT-80 on an 8-bit microcontroller, with the best case key recovery in 17 encryptions. In Addition, we adjust SCADPA to state-of-the-art bit sliced implementation from CHES'17 with experimental evaluation on a 32-bit microcontroller. The attack is then extended to latest bit-permutation-based cipher GIFT, allowing full key recovery in 36 encryptions. Application for reverse engineering of secret S-boxes in PRESENT-like proprietary ciphers is also shown.
引用
收藏
页码:1072 / 1085
页数:14
相关论文
共 50 条
  • [21] Side Channel Cube Attack Improvement and Application to Cryptographic Algorithm
    Wang Yongjuan
    Wang Tao
    Yuan Qingjun
    Gao Yang
    Wang Xiangbin
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (05) : 1087 - 1093
  • [22] Countermeasure for cryptographic chips to resist side-channel attacks
    Zhang, Tao
    Fan, Ming-Yu
    Ruan Jian Xue Bao/Journal of Software, 2008, 19 (11): : 2990 - 2998
  • [23] Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation
    Kasper, Timo
    Oswald, David
    Paar, Christof
    RFID SECURITY AND PRIVACY, 2012, 7055 : 61 - 77
  • [24] Pruned Bit-Reversal Permutations: Mathematical Characterization, Fast Algorithms and Architectures
    Mansour, Mohammad M.
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2013, 61 (12) : 3081 - 3099
  • [25] Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis
    Linge, Yanis
    Dumas, Cecile
    Lambert-Lacroix, Sophie
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2014, 8622 : 199 - 213
  • [26] Enhancing cryptographic code against side channel cryptanalysis with aspects
    Université Libre de Bruxelles, Boulevard du Triomphe, 1050, Bruxelles, Belgium
    Proc. Int. Workshop Secur. Inf. Syst., WOSIS, Conjunction ICEIS, (39-48):
  • [27] Protecting cryptographic integrated circuits with side-channel information
    Nagata, Makoto
    Fujimoto, Daisuke
    Miura, Noriyuki
    Homma, Naofumi
    Hayashi, Yu-ichi
    Sakiyama, Kazuo
    IEICE ELECTRONICS EXPRESS, 2017, 14 (02): : 1 - 13
  • [28] An Improved Method of Side Channel Leak Assessment for Cryptographic Algorithm
    Lu, Fuxiang
    Li, Weijian
    Huang, Zanyu
    Chen, Chuanlu
    Chen, Peng
    WEB AND BIG DATA, PT IV, APWEB-WAIM 2023, 2024, 14334 : 328 - 342
  • [29] Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications
    Freiling, Felix C.
    Schinzel, Sebastian
    FUTURE CHALLENGES IN SECURITY AND PRIVACY FOR ACADEMIA AND INDUSTRY, 2011, 354 : 41 - 55
  • [30] Addressing Side-Channel Vulnerabilities in the Discrete Ziggurat Sampler
    Brannigan, Seamus
    O'Neill, Maire
    Khalid, Ayesha
    Rafferty, Ciara
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2018, 2018, 11348 : 65 - 84