首页> 外文会议>Design, Automation Test in Europe Conference Exhibition >Side-channel plaintext-recovery attacks on leakage-resilient encryption
【24h】

Side-channel plaintext-recovery attacks on leakage-resilient encryption

机译:泄漏弹性加密的侧信道明文恢复攻击

获取原文

摘要

Differential power analysis (DPA) is a powerful tool to extract the key of a cryptographic implementation from observing its power consumption during the en-/decryption of many different inputs. Therefore, cryptographic schemes based on frequent re-keying such as leakage-resilient encryption aim to inherently prevent DPA on the secret key by limiting the amount of data being processed under one key. However, the original asset of encryption, namely the plaintext, is disregarded. This paper builds on this observation and shows that the re-keying countermeasure does not only protect the secret key, but also induces another DPA vulnerability that allows for plaintext recovery. Namely, the frequent re-keying in leakage-resilient streaming modes causes constant plaintexts to be attackable through first-order DPA. Similarly, constant plaintexts can be revealed from re-keyed block ciphers using templates in a second-order DPA. Such plaintext recovery is particularly critical whenever long-term key material is encrypted and thus leaked. Besides leakage-resilient encryption, the presented attacks are also relevant for a wide range of other applications in practice that implicitly use re-keying, such as multi-party communication and memory encryption with random initialization for the key. Practical evaluations on both an FPGA and a microcontroller support the feasibility of the attacks and thus suggest the use of cryptographic implementations protected by mechanisms like masking in scenarios that require data encryption with multiple keys.
机译:差分功率分析(DPA)是一种强大的工具,可通过在许多不同输入的加密/解密过程中观察其功耗来提取加密实现的密钥。因此,基于频繁重新加密的加密方案(例如,防泄漏弹性加密)旨在通过限制在一个密钥下处理的数据量来固有地防止秘密密钥上的DPA。但是,加密的原始资产(即纯文本)被忽略。本文基于此观察结果,表明重新密钥对策不仅保护了密钥,还引发了另一个DPA漏洞,该漏洞允许明文恢复。即,在具有泄漏弹性的流模式中频繁地重新键入密钥会导致恒定的明文可通过一阶DPA受到攻击。类似地,可以使用二阶DPA中的模板从重新加密的分组密码中揭示恒定的纯文本。每当对长期密钥材料进行加密并因此泄漏时,这种明文恢复就显得尤为关键。除了具有防泄漏能力的加密外,所提出的攻击还与许多其他在实践中隐式使用重新加密的应用有关,例如多方通信和对密钥进行随机初始化的内存加密。在FPGA和微控制器上的实际评估都支持了攻击的可行性,因此建议在需要使用多个密钥进行数据加密的场景中使用受掩蔽之类的机制保护的加密实现。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号