Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform

被引:0
|
作者
Li, Yang [1 ]
Sakiyama, Kazuo [1 ]
Kawamura, Shinichi [2 ]
Komano, Yuichi [2 ]
Ohta, Kazuo [1 ]
机构
[1] Univ Electrocommun, 1-5-1 Chofugaoka, Chofu, Tokyo 1828585, Japan
[2] Toshiba Co Ltd, Kawasaki, Kanagawa 2128582, Japan
关键词
Side channel attacks; Masking; Fourier transform; S-box; Probability density function; POWER ANALYSIS; LOGIC;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
At CHES 2006. Prouff et al proposed a novel S-box calculation based on the discrete Fourier transform as a first-order DPA countermeasure At CHES 2008, Coron et al. showed that the original countermeasure can be broken by first-order DPA due to a biased mask and they proposed an improved algorithm This paper shows that there is still a flaw in the Colon's S-box algorithm with respect to a practical software implementation We pie-process the power traces to separate them into two subgroups. each has a biased mask For the separated power traces, we propose two post analysis methods to identify the key One is based on CPA attack against one subgroup. and the other is utilizing the difference of means for two subgroups and a pattern matching. Finally, we compare these two attack methods and propose an algorithm level countermeasure to enhance the security of Coron's S-box
引用
收藏
页码:3 / +
页数:3
相关论文
共 50 条
  • [1] Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform
    Li, Yang
    Sakiyama, Kazuo
    Kawamura, Shinichi
    Ohta, Kazuo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 191 - 199
  • [2] Robust image encryption scheme based on 6D hyper-chaos and DPA-resistant S-box
    Khadem, Behrooz
    Gholamzadeh, Mohammad
    Ahmad, Musheer
    Ansari, Zamir Ahmad
    PHYSICA SCRIPTA, 2025, 100 (03)
  • [3] Provably secure S-Box implementation based on Fourier transform
    Prouff, Emmanuel
    Giraud, Christophe
    Aumonier, Sebastien
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 216 - 230
  • [4] Evaluation of a DPA-Resistant Prototype Chip
    Kirschbaum, Mario
    Popp, Thomas
    25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 43 - 50
  • [5] Attack and improvement of a secure S-Box calculation based on the Fourier transform
    Coron, Jean-Sebastien
    Giraud, Christophe
    Prouff, Emmanuel
    Rivain, Matthieu
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2008, PROCEEDINGS, 2008, 5154 : 1 - +
  • [6] DPA-Resistant QDI Dual-Rail AES S-Box Based on Power-Balanced Weak-Conditioned Half-Buffer
    Lim, James
    Ho, Weng-Geng
    Chong, Kwen-Siong
    Gwee, Bah-Hwee
    2017 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2017,
  • [7] FPGA based DPA-resistant unified architecture for signcryption
    Wang, Yi
    Leiwo, Jussipekka
    Srikanthan, Thambipillai
    Yu, Yu
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 571 - +
  • [8] Security of PRESENT S-box
    AlDabbagh, Sufyan Salim Mahmood
    Al Shaikhli, Imad Fakhri Taha
    2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2012, : 219 - 222
  • [9] A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
    Regazzoni, Francesco
    Cevrero, Alessandro
    Standaert, Francois-Xavier
    Badel, Stephane
    Kluter, Theo
    Brisk, Philip
    Leblebici, Yusuf
    Ienne, Paolo
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS, 2009, 5747 : 205 - +
  • [10] Security of the AES with a Secret S-Box
    Tiessen, Tyge
    Knudsen, Lars R.
    Kolbl, Stefan
    Lauridsen, Martin M.
    FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 175 - 189