Combination of Side-Channel and Collision Attacks to Reveal the Secrets of Gate Masked Implementations

سال انتشار: 1386
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 2,394

فایل این مقاله در 8 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ISCC04_039

تاریخ نمایه سازی: 10 اسفند 1385

چکیده مقاله:

new class of collision attacks which uses side channel analysis has been introduced by Schramm et al. in 2004. They targeted an 8051 based microcontroller running AES in software. They deduced that a pair of plaintexts which lead to the same partial intermediate values is distinguished by examining the similarity of their power consumption traces. This contribution combines collision attacks and simple power analysis to detect a plaintext whose intermediate result includes some identical partial values. In this article, our target is ASIC and FPGA implementations of cryptographic algorithms because the designers of such devices have to share the resources due to the area constrain. In fact, our proposed attack is based on the concept that the power consumption of a CMOS device has a significant minimum if two consecutive values which are loaded in a register are the same. First, we show that key dependent collisions could occur in most registers of cryptographic hardwares. It is shown that how these collisions can be detected by investigating the power consumption traces. The proposed attack decreases the number of candidates for the secret key. For instance, 2128 candidates in a particular implementation of AES-128 encryption are decreased to 28. Furthermore, it is shown how this attack works in the presence of the gate masking, and how the masking at the gate level affects the size of the key candidate space. Finally, a trade off between the success rate of this attack and the number of mask bits is illustrated. Although the proposed attack is generally not restricted to a particular cryptographic algorithm, AES-128 encryption algorithm is considered for the examples shown.

نویسندگان

Amir Moradi

Department of Computer Engineering

Mahmoud Salmasizadeh

Electronic Research Center, Sharif University of Technology, Tehran, Iran

Mohammad Manzuri Shalmani

Department of Computer Engineering Department of Computer Engineering

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • H. Dobbertin. Cryptanalysis of md4. Journal of Cryptology, volume 11, ...
  • Yuval Ishai, Amit Sahai, and David Wagner. Private Circuits: Securing ...
  • S.M. Kang and Y. Leblebici. CMOS Digital Integrated Circuits: Analysis ...
  • Paul C. Kocher. Timing Attacks on Imp lementations of Di ...
  • Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. Differential Power ...
  • Stefan Mangard, Thomas Popp, and Berndt M. Gammel. Side-Channel Leakage ...
  • Thomas S. Messerges, Ezzy A. Dabbish, and Larry Puhl. Method ...
  • نمایش کامل مراجع