Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform

被引:0
|
作者
Li, Yang [1 ]
Sakiyama, Kazuo [1 ]
Kawamura, Shinichi [2 ]
Komano, Yuichi [2 ]
Ohta, Kazuo [1 ]
机构
[1] Univ Electrocommun, 1-5-1 Chofugaoka, Chofu, Tokyo 1828585, Japan
[2] Toshiba Co Ltd, Kawasaki, Kanagawa 2128582, Japan
关键词
Side channel attacks; Masking; Fourier transform; S-box; Probability density function; POWER ANALYSIS; LOGIC;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
At CHES 2006. Prouff et al proposed a novel S-box calculation based on the discrete Fourier transform as a first-order DPA countermeasure At CHES 2008, Coron et al. showed that the original countermeasure can be broken by first-order DPA due to a biased mask and they proposed an improved algorithm This paper shows that there is still a flaw in the Colon's S-box algorithm with respect to a practical software implementation We pie-process the power traces to separate them into two subgroups. each has a biased mask For the separated power traces, we propose two post analysis methods to identify the key One is based on CPA attack against one subgroup. and the other is utilizing the difference of means for two subgroups and a pattern matching. Finally, we compare these two attack methods and propose an algorithm level countermeasure to enhance the security of Coron's S-box
引用
收藏
页码:3 / +
页数:3
相关论文
共 50 条
  • [31] DGFinSAL: A New Low Power Adiabatic FinFET-Based Logic Family for DPA-Resistant Applications
    Panahifar, Ehsan
    Hassanzadeh, Alireza
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2021, 40 (10) : 4877 - 4902
  • [32] Cryptographic strength evaluation of AES s-box variants
    Waqas U.
    Afzal S.
    Mir M.A.
    Yousaf M.
    International Journal of Information and Computer Security, 2021, 14 (3-4): : 263 - 280
  • [33] Review of Chaotic Based S-Box Structures
    Cengiz, Ayse
    Avci, Derya
    2019 7TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2019,
  • [34] Enhance Security of Advance Encryption Standard Algorithm Based on Key-dependent S-Box
    alabaichi, Ashwak
    Salih, Adnan Ibrahem
    2015 FIFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING AND COMMUNICATIONS (ICDIPC), 2015, : 44 - 53
  • [35] Smart Grid Security by Embedding S-Box Advanced Encryption Standard
    Kumar, Niraj
    Mishra, Vishnu Mohan
    Kumar, Adesh
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (01): : 623 - 638
  • [36] Enhancing security with Aboodh transformation and S-box fusion in image encryption
    Rasappan S.
    Murugesan R.
    Kumaravel S.K.
    Mohan K.R.
    Nagaram N.B.
    International Journal of Information Technology, 2024, 16 (6) : 3949 - 3961
  • [37] AES Security Improvement using Hybrid Approach for S-box design
    Nandan, V.
    Rao, R. Gowri Shankar
    2019 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2019), 2019,
  • [38] The study of selective encryption of motion vector based on the S-Box for the security improvement in the process of video
    Sung-Sam Hong
    Myung-Mook Han
    Multimedia Tools and Applications, 2014, 71 : 1577 - 1597
  • [39] The study of selective encryption of motion vector based on the S-Box for the security improvement in the process of video
    Hong, Sung-Sam
    Han, Myung-Mook
    MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 71 (03) : 1577 - 1597
  • [40] A Dual-voltage Single-rail Dynamic DPA-resistant Logic Based on Charge Sharing Mechanism
    Tang, Wenyi
    Jia, Song
    Wang, Yuan
    PROCEEDINGS OF THE 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRON DEVICES AND SOLID-STATE CIRCUITS (EDSSC), 2015, : 483 - 486