首页> 外文会议>Design, Automation Test in Europe Conference Exhibition >Side-channel plaintext-recovery attacks on leakage-resilient encryption
【24h】

Side-channel plaintext-recovery attacks on leakage-resilient encryption

机译:侧通道明文恢复攻击泄漏弹性加密

获取原文

摘要

Differential power analysis (DPA) is a powerful tool to extract the key of a cryptographic implementation from observing its power consumption during the en-/decryption of many different inputs. Therefore, cryptographic schemes based on frequent re-keying such as leakage-resilient encryption aim to inherently prevent DPA on the secret key by limiting the amount of data being processed under one key. However, the original asset of encryption, namely the plaintext, is disregarded. This paper builds on this observation and shows that the re-keying countermeasure does not only protect the secret key, but also induces another DPA vulnerability that allows for plaintext recovery. Namely, the frequent re-keying in leakage-resilient streaming modes causes constant plaintexts to be attackable through first-order DPA. Similarly, constant plaintexts can be revealed from re-keyed block ciphers using templates in a second-order DPA. Such plaintext recovery is particularly critical whenever long-term key material is encrypted and thus leaked. Besides leakage-resilient encryption, the presented attacks are also relevant for a wide range of other applications in practice that implicitly use re-keying, such as multi-party communication and memory encryption with random initialization for the key. Practical evaluations on both an FPGA and a microcontroller support the feasibility of the attacks and thus suggest the use of cryptographic implementations protected by mechanisms like masking in scenarios that require data encryption with multiple keys.
机译:差分功率分析(DPA)是一种强大的工具,可以在许多不同输入的en /解密期间从观察其功耗来提取加密实现的密钥的强大工具。因此,基于频繁的重新键控的加密方案,例如泄漏 - 弹性加密旨在通过限制在一个键下处理的数据量来固有地防止密钥上的DPA。但是,加密的原始资产,即明文,被忽略了。本文构建了此观察结果,并表明重新键控对策不仅保护了秘密密钥,而且还诱导了另一个允许明文恢复的DPA漏洞。即,频繁在泄漏 - 弹性流式流模式下键控导致恒定的明文通过一阶DPA攻击。类似地,可以在二阶DPA中使用模板从重新键控的块密码露出恒定的明文。每当长期关键材料加密并因此泄漏时,这种明文恢复尤其重要。除了漏益 - 弹性加密之外,所呈现的攻击也与各种其他应用程序相关的实践中隐含地使用重新键控,例如多方通信和内存加密,与键随机初始化。 FPGA和微控制器的实用评估支持攻击的可行性,从而提示使用受屏蔽中需要屏蔽的机制保护的加密实现的使用,这些方法需要多个键的数据加密。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号