Improving Side-Channel Attacks by Exploiting Substitution Boxes Properties - Télécom Paris Accéder directement au contenu
Communication Dans Un Congrès Année : 2007

Improving Side-Channel Attacks by Exploiting Substitution Boxes Properties

Résumé

This article revisits the “Correlation Power At- tack” (CPA [18]), and justifies its physical relevance regarding CMOS circuits dissipation model. The CPA is then shown to be practical – and reproducible – on a real piece of hardware (DES co-processor.) Based on this successful at- tack, a theory about the vulnerability is derived. It happens that the attack asymptotic strength is not related to the acquisition conditions, but only to the algorithm implementation. In the case of an iterative implementation of a Feistel cipher, we show that the customarily used power models are valid. Within this theoretical framework, the attack strength depends only on the substitution boxes mathematical properties. A new distinguisher (9), more efficient than the transparency order [10], is proposed. Two enhancements of the proposed distinguisher are presented. The study of the relationship between the proposed distinguishers and the substitution boxes is still an open problem.
Fichier non déposé

Dates et versions

hal-02893245 , version 1 (08-07-2020)

Identifiants

  • HAL Id : hal-02893245 , version 1

Citer

Renaud Pacalet, Sylvain Guilley, Philippe Hoogvorst, Johannes Schmidt. Improving Side-Channel Attacks by Exploiting Substitution Boxes Properties. International Conference on Boolean Functions: Cryptography and Applications (BFCA), May 2007, Paris, France. ⟨hal-02893245⟩
31 Consultations
0 Téléchargements

Partager

Gmail Facebook X LinkedIn More