DES with any reduced masked rounds is not secure against side-channel attacks

被引:7
|
作者
Kim, Jongsung [2 ]
Lee, Yuseop [1 ]
Lee, Sangjin [1 ]
机构
[1] Korea Univ, CIST, Seoul, South Korea
[2] Kyungnam Univ, Div E Business, Masan, South Korea
关键词
Side-channel attacks; Differentials; DES;
D O I
10.1016/j.camwa.2010.01.011
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The literature offers several efficient masking methods for providing resistance to side-channel attacks against iterative block ciphers, such as Data Encryption Standard (DES) and Advanced Encryption Standard (AES). One of the proposed methods is to apply independent masks to each of the first and last few rounds. However, at the workshops on Selected Areas in Cryptography (SAC) 2006 and Cryptographic Hardware and Embedded System (CHES) 2007, Handschuh-Preneel and Biryukov-Khovratovich showed that DES and AES with such reduced masked rounds are still vulnerable to side-channel attacks combined with block cipher cryptanalysis. Specifically, Handschuh and Preneel presented differential based side-channel attacks on DES with the first 4 rounds masked, and Biryukov and Khovratovich presented impossible and multiset collision based side-channel attacks on AES with the first 2, 3 and 4 rounds masked. More recently, Kim and Hong showed that AES-192 and AES-256 with the first 5 rounds masked are also vulnerable to side-channel attacks based on the meet-in-the-middle technique. In this paper, we focus on the security of DES with reduced masked rounds against side-channel attacks; we propose differential based side-channel attacks on DES with the first 5, 6 and 7 rounds masked: they require 2(17.4), 2(24), 2(35.5) chosen plaintexts with associate power traces and collision measurements, correspondingly. Our attacks are the first known side-channel attacks on DES with the first 5, 6 and 7 rounds masked: our attack results show that DES with any reduced masked rounds is not secure against side-channel attacks, i.e., in order for DES to be resistant to side-channel attacks, entire rounds should be masked. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:347 / 354
页数:8
相关论文
共 50 条
  • [21] ISA Extensions of Shuffling Against Side-Channel Attacks
    Zhou, Jiayun
    Qin, Guofeng
    Li, Lu
    Guo, Chun
    Wang, Weijia
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 43 (03) : 761 - 773
  • [22] Extractors against side-channel attacks: weak or strong?
    Medwed, Marcel
    Standaert, Francois-Xavier
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (03) : 231 - 241
  • [23] Design and Verification of Secure Cache Wrapper against Access-driven Side-Channel Attacks
    Niazmand, Behrad
    Azad, Siavoosh Payandeh
    Jervan, Gert
    Sepulveda, Johanna
    2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 672 - 676
  • [24] An Efficient Method against Side-Channel Attacks on ECC
    LIU Shuanggen~ 1
    2. College of Computer Information Engineering
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1573 - 1576
  • [25] Threshold implementations against side-channel attacks and glitches
    Nikova, Svetla
    Rechberger, Christian
    Rijmen, Vincent
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 529 - +
  • [26] Extractors against Side-Channel Attacks: Weak or Strong?
    Medwed, Marcel
    Standaert, Francois-Xavier
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 256 - 272
  • [27] A machine learning approach against a masked AES Reaching the limit of side-channel attacks with a learning model
    Lerman, Liran
    Bontempi, Gianluca
    Markowitch, Olivier
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2015, 5 (02) : 123 - 139
  • [28] Robust Secure Charge-Sharing Symmetric Adiabatic Logic Against Side-Channel Attacks
    Monteiro, Cancio
    Takahashi, Yasuhiro
    Sekine, Toshikazu
    2013 36TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2013, : 732 - 736
  • [29] DNNCloak: Secure DNN Models Against Memory Side-channel Based Reverse Engineering Attacks
    Che, Yuezhi
    Wang, Rujia
    2022 IEEE 40TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2022), 2022, : 89 - 96
  • [30] Randomization approaches for Secure SAR ADC design resilient against Power Side-Channel Attacks
    Karanth, Sumanth N.
    Oruganti, Sirish
    Wang, Meizhi
    Kulkarni, Jaydeep P.
    2024 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, 2024, : 282 - 292