跳到主要导航 跳到搜索 跳到主要内容

You cannot hide behind the mask: Power analysis on a provably secure s-box implementation

  • J. Pan*
  • , J. I. Den Hartog
  • , Jiqiang Lu
  • *此作品的通讯作者

科研成果: 书/报告/会议事项章节会议稿件同行评审

摘要

Power analysis has shown to be successful in breaking symmetric cryptographic algorithms implemented on low resource devices. Prompted by the breaking of many protected implementations in practice, researchers saw the need of validating security of implementations with formal methods. Three generic S-box implementation methods have been proposed by Prouff el al., together with formal proofs of their security against 1st or 2nd-order side-channel analysis. These methods use a similar combination of masking and hiding countermeasures. In this paper, we show that although proven resistant to standard power analysis, these implementation methods are vulnerable to a more sophisticated form of power analysis that combines Differential Power Analysis (DPA) and pattern matching techniques. This new form of power analysis is possible under the same assumptions about power leakage as standard DPA attacks and the added complexity is limited: our experiments show that 900 traces are sufficient to break these algorithms on a device where 150 traces are typically needed for standard DPA. We conclude that the defense strategies-hiding by repeating operations for each possible value, and masking and hiding using the same random number-can create new vulnerabilities.

源语言英语
主期刊名Information Security Applications - 10th International Workshop, WISA 2009, Revised Selected Papers
178-192
页数15
DOI
出版状态已出版 - 2009
已对外发布
活动10th International Workshop on Information Security Applications, WISA 2009 - Busan, 韩国
期限: 25 8月 200927 8月 2009

出版系列

姓名Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
5932 LNCS
ISSN(印刷版)0302-9743
ISSN(电子版)1611-3349

会议

会议10th International Workshop on Information Security Applications, WISA 2009
国家/地区韩国
Busan
时期25/08/0927/08/09

指纹

探究 'You cannot hide behind the mask: Power analysis on a provably secure s-box implementation' 的科研主题。它们共同构成独一无二的指纹。

引用此