On Side Channel Vulnerabilities of Bit Permutations in Cryptographic Algorithms

被引:8
|
作者
Breier, Jakub [1 ]
Jap, Dirmanto [2 ]
Hou, Xiaolu [3 ]
Bhasin, Shivam [2 ]
机构
[1] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore 639798, Singapore
[2] Nanyang Technol Univ, Temasek Labs, Phys Anal & Cryptog Engn Lab, Singapore 637553, Singapore
[3] Natl Univ Singapore, Sch Comp, Singapore 119077, Singapore
基金
新加坡国家研究基金会;
关键词
Block ciphers; side-channel attacks; bit permutations; implementation attacks; ATTACK;
D O I
10.1109/TIFS.2019.2932230
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Lightweight block ciphers rely on simple operations to allow compact implementation. Thanks to its efficiency, bit permutation has emerged as an optimal choice for state-wise diffusion. It can be implemented by simple wiring in hardware or shifts in software. However, efficiency and security often go against each other. In this paper, we show how bit permutations introduce a side-channel vulnerability that can be exploited to extract the secret key from the cipher. Such vulnerabilities are specific to bit permutations and do not occur in other state-wise diffusion alternatives. We propose side-channel assisted differential-plaintext attack (SCADPA) which targets this vulnerability in the bit permutation operation. SCADPA is first experimentally demonstrated on PRESENT-80 on an 8-bit microcontroller, with the best case key recovery in 17 encryptions. In Addition, we adjust SCADPA to state-of-the-art bit sliced implementation from CHES'17 with experimental evaluation on a 32-bit microcontroller. The attack is then extended to latest bit-permutation-based cipher GIFT, allowing full key recovery in 36 encryptions. Application for reverse engineering of secret S-boxes in PRESENT-like proprietary ciphers is also shown.
引用
收藏
页码:1072 / 1085
页数:14
相关论文
共 50 条
  • [41] On the Bit Security of Cryptographic Primitives
    Micciancio, Daniele
    Walter, Michael
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT I, 2018, 10820 : 3 - 28
  • [42] Power Side-Channel Vulnerability Assessment of Lightweight Cryptographic Scheme, XOODYAK
    Golder, Anupam
    Das, Dehayan
    Ghosh, Santosh
    Varna, Avinash
    Sabbagh, Majid
    Ray, Sayak
    Elnaggar, Rana
    Friel, Joseph
    Dinu, Daniel
    Fung, Jason M.
    2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC, 2023,
  • [43] Semi-Automatic Locating of Cryptographic Operations in Side-Channel Traces
    Trautmann J.
    Beckers A.
    Wouters L.
    Gierlichs B.
    Wildermann S.
    Verbauwhede I.
    Teich J.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2022 (01): : 345 - 366
  • [44] Securing Software Cryptographic Primitives for Embedded Systems against Side Channel Attacks
    Agosta, Giovanni
    Barenghi, Alessandro
    Pelosi, Gerardo
    2014 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2014,
  • [45] Side-channel cryptographic attacks using pseudo-boolean optimization
    Yossef Oren
    Avishai Wool
    Constraints, 2016, 21 : 616 - 645
  • [46] Power Current Modeling of Cryptographic VLSI Circuits for Analysis of Side Channel Attacks
    Nagata, Makoto
    Fujimoto, Daisuke
    Tanaka, Daichi
    2013 ASIA-PACIFIC SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2013,
  • [47] Side-channel attack countermeasure evaluation of cryptographic hardware implementation circuit
    Asai, Toshiya
    Asahi, Kensaku
    Shiozaki, Mitsuru
    Fujino, Takeshi
    Yoshikawa, Masaya
    IEEJ Transactions on Electronics, Information and Systems, 2014, 134 (12) : 1767 - 1774
  • [48] Challenges in Feasible Simulation of Side-Channel Attack Resistance for Cryptographic Hardware
    Iokibe, Kengo
    Himuro, Masaki
    Toyota, Yoshitaka
    PROCEEDINGS OF THE 2024 IEEE JOINT INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY, SIGNAL & POWER INTEGRITY: EMC JAPAN/ASIAPACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY, EMC JAPAN/APEMC OKINAWA 2024, 2024, : 49 - 52
  • [49] Automated design of cryptographic devices resistant to multiple side-channel attacks
    Kulikowski, Konrad
    Smirnov, Alexander
    Taubin, Alexander
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 399 - 413
  • [50] A Data Augmentation Method for Side-Channel Attacks on Cryptographic Integrated Circuits
    Cui, Xiaotong
    Zhang, Hongxin
    Xu, Jun
    Fang, Xing
    Ning, Wenxu
    Wang, Yuanzhen
    Hosen, Md Sabbir
    ELECTRONICS, 2024, 13 (07)