Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform

被引:0
|
作者
Li, Yang [1 ]
Sakiyama, Kazuo [1 ]
Kawamura, Shinichi [2 ]
Komano, Yuichi [2 ]
Ohta, Kazuo [1 ]
机构
[1] Univ Electrocommun, 1-5-1 Chofugaoka, Chofu, Tokyo 1828585, Japan
[2] Toshiba Co Ltd, Kawasaki, Kanagawa 2128582, Japan
关键词
Side channel attacks; Masking; Fourier transform; S-box; Probability density function; POWER ANALYSIS; LOGIC;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
At CHES 2006. Prouff et al proposed a novel S-box calculation based on the discrete Fourier transform as a first-order DPA countermeasure At CHES 2008, Coron et al. showed that the original countermeasure can be broken by first-order DPA due to a biased mask and they proposed an improved algorithm This paper shows that there is still a flaw in the Colon's S-box algorithm with respect to a practical software implementation We pie-process the power traces to separate them into two subgroups. each has a biased mask For the separated power traces, we propose two post analysis methods to identify the key One is based on CPA attack against one subgroup. and the other is utilizing the difference of means for two subgroups and a pattern matching. Finally, we compare these two attack methods and propose an algorithm level countermeasure to enhance the security of Coron's S-box
引用
收藏
页码:3 / +
页数:3
相关论文
共 50 条
  • [21] Toward More Efficient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation
    Ueno, Rei
    Homma, Naofumi
    Aoki, Takafumi
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2017, 10348 : 50 - 64
  • [22] Enhancing Security of Double Random Phase Encoding Based on Random S-Box
    Girija, R.
    Singh, Hukum
    3D RESEARCH, 2018, 9 (02)
  • [23] Mobius Transformation and Permutation Based S-Box to Enhance IoT Multimedia Security
    Aribilola, Ifeoluwapo
    Lee, Brian
    Naveed Asghar, Mamoona
    IEEE ACCESS, 2024, 12 : 140792 - 140808
  • [24] “S-Box” Implementation of AES Is Not Side Channel Resistant
    Ashokkumar C.
    Bholanath Roy
    M. Bhargav Sri Venkatesh
    Bernard L. Menezes
    Journal of Hardware and Systems Security, 2020, 4 (2) : 86 - 97
  • [25] Evaluation of Key Dependent S-Box Based Data Security Algorithm using Hamming Distance and Balanced Output
    Maram, Balajee K.
    Gnanasekar, J. M.
    TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2016, 5 (01): : 67 - 75
  • [26] The Power Suppression Techniques for the DPA-resistant RISC-V CPU Core Based on WDDL
    Cui X.
    Li X.
    Li H.
    Zhang X.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2023, 45 (09): : 3244 - 3252
  • [27] DGFinSAL: A New Low Power Adiabatic FinFET-Based Logic Family for DPA-Resistant Applications
    Ehsan Panahifar
    Alireza Hassanzadeh
    Circuits, Systems, and Signal Processing, 2021, 40 : 4877 - 4902
  • [28] An Energy Efficient and DPA Attack Resilient NCFET-Based S-Box Design for Secure and Lightweight SLIM Ciphers
    Penumalli, Koteswara Rao
    Gonuguntla, Venkateswarlu
    Vaddi, Ramesh
    ELECTRONICS, 2025, 14 (06):
  • [29] DPA Resistance Analysis of the Cryptographic S-box Implementation in Static CMOS and TDPL Logic Style
    Kumar, Chintalapudi Satish
    Prathiba, A.
    Bhaskaran, V. S. Kanchana
    2017 INTERNATIONAL CONFERENCE ON NEXTGEN ELECTRONIC TECHNOLOGIES: SILICON TO SOFTWARE (ICNETS2), 2017, : 281 - 288
  • [30] Implementation of AES S-Box Based on VHDL
    Yu, Zhichao
    INNOVATIVE COMPUTING AND INFORMATION, ICCIC 2011, PT I, 2011, 231 : 52 - 58