DES with any reduced masked rounds is not secure against side-channel attacks

被引:7
|
作者
Kim, Jongsung [2 ]
Lee, Yuseop [1 ]
Lee, Sangjin [1 ]
机构
[1] Korea Univ, CIST, Seoul, South Korea
[2] Kyungnam Univ, Div E Business, Masan, South Korea
关键词
Side-channel attacks; Differentials; DES;
D O I
10.1016/j.camwa.2010.01.011
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The literature offers several efficient masking methods for providing resistance to side-channel attacks against iterative block ciphers, such as Data Encryption Standard (DES) and Advanced Encryption Standard (AES). One of the proposed methods is to apply independent masks to each of the first and last few rounds. However, at the workshops on Selected Areas in Cryptography (SAC) 2006 and Cryptographic Hardware and Embedded System (CHES) 2007, Handschuh-Preneel and Biryukov-Khovratovich showed that DES and AES with such reduced masked rounds are still vulnerable to side-channel attacks combined with block cipher cryptanalysis. Specifically, Handschuh and Preneel presented differential based side-channel attacks on DES with the first 4 rounds masked, and Biryukov and Khovratovich presented impossible and multiset collision based side-channel attacks on AES with the first 2, 3 and 4 rounds masked. More recently, Kim and Hong showed that AES-192 and AES-256 with the first 5 rounds masked are also vulnerable to side-channel attacks based on the meet-in-the-middle technique. In this paper, we focus on the security of DES with reduced masked rounds against side-channel attacks; we propose differential based side-channel attacks on DES with the first 5, 6 and 7 rounds masked: they require 2(17.4), 2(24), 2(35.5) chosen plaintexts with associate power traces and collision measurements, correspondingly. Our attacks are the first known side-channel attacks on DES with the first 5, 6 and 7 rounds masked: our attack results show that DES with any reduced masked rounds is not secure against side-channel attacks, i.e., in order for DES to be resistant to side-channel attacks, entire rounds should be masked. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:347 / 354
页数:8
相关论文
共 50 条
  • [31] Compiler-Based Techniques to Secure Cryptographic Embedded Software Against Side-Channel Attacks
    Agosta, Giovanni
    Barenghi, Alessandro
    Pelosi, Gerardo
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (08) : 1550 - 1554
  • [32] NEWCACHE: SECURE CACHE ARCHITECTURE THWARTING CACHE SIDE-CHANNEL ATTACKS
    Liu, Fangfei
    Wu, Hao
    Mai, Kenneth
    Lee, Ruby B.
    IEEE MICRO, 2016, 36 (05) : 8 - 16
  • [33] Secure Broadcasting of Two Encrypted Sources under Side-Channel Attacks
    Santoso, Bagus
    Oohama, Yasutada
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 305 - 309
  • [34] Secure and efficient elliptic curve cryptography resists side-channel attacks
    Zhang Tao~1
    2.School of Computer Science & Engineering
    3.School of Electronic Engineering
    Journal of Systems Engineering and Electronics, 2009, 20 (03) : 660 - 665
  • [35] Secure and efficient elliptic curve cryptography resists side-channel attacks
    Zhang Tao
    Fan Mingyu
    Zheng Xiaoyu
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2009, 20 (03) : 660 - 665
  • [36] Thwarting Side-Channel Attacks
    Edwards, Chris
    COMMUNICATIONS OF THE ACM, 2020, 63 (10) : 13 - 14
  • [37] Towards Thwarting Template Side-Channel Attacks in Secure Cloud Deduplications
    Zhang, Yuan
    Mao, Yunlong
    Xu, Minze
    Xu, Fengyuan
    Zhong, Sheng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1008 - 1018
  • [38] Circuits and design techniques for secure ICs resistant to side-channel attacks
    Verbauwhede, I.
    Tiri, K.
    Hwang, D.
    Schaumont, P.
    2006 IEEE INTERNATIONAL CONFERENCE ON INTEGRATED CIRCUIT DESIGN AND TECHNOLOGY, PROCEEDINGS, 2006, : 57 - +
  • [39] Combined Side-Channel Attacks
    Elaabid, M. Abdelaziz
    Meynard, Olivier
    Guilley, Sylvain
    Danger, Jean-Luc
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 175 - 190
  • [40] Side-channel attacks on smartcards
    NGS Software
    Netw. Secur., 2006, 12 (18-20):