...
首页> 外文期刊>Computers & mathematics with applications >DES with any reduced masked rounds is not secure against side-channel attacks
【24h】

DES with any reduced masked rounds is not secure against side-channel attacks

机译:具有减少的掩蔽回合的DES不能抵抗侧信道攻击

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

The literature offers several efficient masking methods for providing resistance to side-channel attacks against iterative block ciphers, such as Data Encryption Standard (DES) and Advanced Encryption Standard (AES). One of the proposed methods is to apply independent masks to each of the first and last few rounds. However, at the workshops on Selected Areas in Cryptography (SAC) 2006 and Cryptographic Hardware and Embedded System (CHES) 2007, Handschuh-Preneel and Biryukov-Khovratovich showed that DES and AES with such reduced masked rounds are still vulnerable to side-channel attacks combined with block cipher cryptanalysis. Specifically, Handschuh and Preneel presented differential based side-channel attacks on DES with the first 4 rounds masked, and Biryukov and Khovratovich presented impossible and multiset collision based side-channel attacks on AES with the first 2, 3 and 4 rounds masked. More recently, Kim and Hong showed that AES-192 and AES-256 with the first 5 rounds masked are also vulnerable to side-channel attacks based on the meet-in-the-middle technique.rnIn this paper, we focus on the security of DES with reduced masked rounds against side-channel attacks; we propose differential based side-channel attacks on DES with the first 5, 6 and 7 rounds masked: they require 2~(17.4),2~(24),2~(35.5) chosen plaintexts with associate power traces and collision measurements, correspondingly. Our attacks are the first known side-channel attacks on DES with the first 5, 6 and 7 rounds masked; our attack results show that DES with any reduced masked rounds is not secure against side-channel attacks, i.e., in order for DES to be resistant to side-channel attacks, entire rounds should be masked.
机译:文献提供了几种有效的掩蔽方法,用于抵制针对迭代块密码的侧信道攻击,例如数据加密标准(DES)和高级加密标准(AES)。所提出的方法之一是对前几轮和最后几轮都应用独立的蒙版。然而,在2006年密码学(SAC)和2007年密码学硬件与嵌入式系统(CHES)选定区域的研讨会上,Handschuh-Preneel和Biryukov-Khovratovich指出,具有如此减少的掩蔽回合的DES和AES仍然容易受到侧通道攻击结合分组密码密码分析。具体来说,Handschuh和Preneel在前4轮被掩盖的情况下对DES提出了基于差分的侧信道攻击,而Biryukov和Khovratovich在AES的前2轮,在3轮和4轮被掩蔽的情况下提出了基于不可能和多集冲突的侧信道攻击。最近,Kim和Hong展示了基于中间相遇技术的前5轮掩盖的AES-192和AES-256也容易受到侧通道攻击。在本文中,我们重点研究安全性。减少了针对侧信道攻击的掩蔽回合的DES;我们建议对DES进行基于差分的边信道攻击,并屏蔽前5、6和7轮攻击:它们需要2〜(17.4),2〜(24),2〜(35.5)个选定的明文,并带有相关功率迹线和碰撞测量,相应地。我们的攻击是对DES的第一个已知的边信道攻击,其中前5、6和7轮都被屏蔽了。我们的攻击结果表明,具有减少的掩蔽回合的DES对于侧信道攻击是不安全的,即为了使DES能够抵抗侧信道攻击,应该对整个回合进行掩蔽。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号