首页> 外文会议>2018 Design, Automation amp; Test in Europe Conference amp; Exhibition >SCADPA: Side-channel assisted differential-plaintext attack on bit permutation based ciphers
【24h】

SCADPA: Side-channel assisted differential-plaintext attack on bit permutation based ciphers

机译:SCADPA:基于比特排列的密码的边信道辅助差分明文攻击

获取原文
获取原文并翻译 | 示例

摘要

Bit permutations are a common choice for diffusion function in lightweight block ciphers, owing to their low implementation footprint. In this paper, we present a novel Side-Channel Assisted Differential-Plaintext Attack (SCADPA), exploiting specific vulnerabilities of bit permutations. SCADPA is a chosen-plaintext attack, knowledge of the ciphertext is not required. Unlike statistical methods, commonly used for distinguisher in standard power analysis, the proposed method is more differential in nature. The attack shows that diffusion layer can play a significant role in distinguishing the internal cipher state. We demonstrate how to practically exploit such vulnerability to extract the secret key. Results on microcontroller-based PRESENT-80 cipher lead to full key retrieval using as low as 17 encryptions. It is possible to automate the attack by using a thresholding method detailed in the paper. Several case studies are presented, using various attacker models and targeting different encryption modes (such as CTR and CBC). We provide a discussion on how to avoid such attack from the design point of view.
机译:比特置换由于其实现占用空间小,是轻量级分组密码中扩散功能的常见选择。在本文中,我们提出了一种新颖的侧信道辅助差分纯文本攻击(SCADPA),它利用了比特排列的特定漏洞。 SCADPA是一种选择明文攻击,不需要了解密文。与通常用于标准功效分析中区分的统计方法不同,该方法本质上更具差异。攻击表明,扩散层可以在区分内部密码状态方面发挥重要作用。我们演示了如何实际利用这种漏洞来提取密钥。基于微控制器的PRESENT-80密码的结果导致使用低至17种加密的全密钥检索。使用本文详述的阈值方法可以自动执行攻击。提出了几个案例研究,使用各种攻击者模型并针对不同的加密模式(例如CTR和CBC)。我们从设计的角度讨论了如何避免这种攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号