首页> 外文会议>Design, Automation Test in Europe Conference Exhibition >SCADPA: Side-Channel Assisted Differential-Plaintext Attack on Bit Permutation Based Ciphers
【24h】

SCADPA: Side-Channel Assisted Differential-Plaintext Attack on Bit Permutation Based Ciphers

机译:斯科帕:侧通道辅助差分攻击基于比特污染的密码攻击

获取原文

摘要

Bit permutations are a common choice for diffusion function in lightweight block ciphers, owing to their low implementation footprint. In this paper, we present a novel Side-Channel Assisted Differential-Plaintext Attack (SCADPA), exploiting specific vulnerabilities of bit permutations. SCADPA is a chosen-plaintext attack, knowledge of the ciphertext is not required. Unlike statistical methods, commonly used for distinguisher in standard power analysis, the proposed method is more differential in nature. The attack shows that diffusion layer can play a significant role in distinguishing the internal cipher state. We demonstrate how to practically exploit such vulnerability to extract the secret key. Results on microcontroller-based PRESENT-80 cipher lead to full key retrieval using as low as 17 encryptions. It is possible to automate the attack by using a thresholding method detailed in the paper. Several case studies are presented, using various attacker models and targeting different encryption modes (such as CTR and CBC). We provide a discussion on how to avoid such attack from the design point of view.
机译:由于它们的低实现占地面积,位置换是轻质块密码中的扩散功能的常见选择。在本文中,我们提出了一种新的侧通道辅助差分宣言攻击(SCADPA),利用比特置换的特定漏洞。斯科普纳是一个被选中的明文攻击,不需要了解密文。与统计方法不同,常用于标准功率分析中的区分器,所提出的方法本质上更差异。该攻击表明,扩散层可以在区分内部密码状态时起着重要作用。我们演示了如何实际利用此类漏洞来提取密钥。结果基于微控制器的当前型号为80密码,通过低至17个加密来实现全键检索。可以使用纸张中详述的阈值化方法自动化攻击。使用各种攻击者模型并定位不同的加密模式(例如CTR和CBC)来呈现几种案例研究。我们提供有关如何从设计角度避免此类攻击的讨论。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号