【24h】

SCARE of an Unknown Hardware Feistel Implementation

机译:未知硬件Feistel实施的恐慌

获取原文

摘要

Physical attacks based on Side Channel Analysis (SCA) or on Fault Analysis (FA) target a secret usually manipulated by a public algorithm. SCA can also be used for Reverse Engineering (SCARE) against the software implementation of a private algorithm. In this paper, we claim that an unknown Feistel scheme with an hardware design can be recovered with a chosen plaintexts SCA attack. First, we show that whatever is the input of the unknown Feistel function, its one-round output can be guessed by SCA. Using this relation, two attacks for recovering the algorithm are proposed : an expensive interpolation attack on a generic Feistel scheme and an improved attack on a specific but commonly used scheme. Then, a countermeasure is proposed.
机译:基于侧信道分析(SCA)或故障分析(FA)目标的物理攻击目标通常由公共算法操纵的秘密。 SCA还可用于反对私有算法的软件实现的逆向工程(恐慌)。在本文中,我们声称,具有硬件设计的未知Feistel方案可以通过选择的明文SCA攻击恢复。首先,我们表明,无论是什么是未知的Feistel功能的输入,它可以通过SCA猜测其一轮输出。使用此关系,提出了用于恢复算法的两次攻击:对通用Feistel方案的昂贵插值攻击以及对特定但常用方案的改进攻击。然后,提出了对策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号