Skip to Main content Skip to Navigation
Conference papers

Improving Side-Channel Attacks by Exploiting Substitution Boxes Properties

Abstract : This article revisits the “Correlation Power At- tack” (CPA [18]), and justifies its physical relevance regarding CMOS circuits dissipation model. The CPA is then shown to be practical – and reproducible – on a real piece of hardware (DES co-processor.) Based on this successful at- tack, a theory about the vulnerability is derived. It happens that the attack asymptotic strength is not related to the acquisition conditions, but only to the algorithm implementation. In the case of an iterative implementation of a Feistel cipher, we show that the customarily used power models are valid. Within this theoretical framework, the attack strength depends only on the substitution boxes mathematical properties. A new distinguisher (9), more efficient than the transparency order [10], is proposed. Two enhancements of the proposed distinguisher are presented. The study of the relationship between the proposed distinguishers and the substitution boxes is still an open problem.
Complete list of metadata
Contributor : Renaud Pacalet Connect in order to contact the contributor
Submitted on : Wednesday, July 8, 2020 - 10:20:34 AM
Last modification on : Monday, October 19, 2020 - 11:59:14 AM


  • HAL Id : hal-02893245, version 1


Renaud Pacalet, Sylvain Guilley, Philippe Hoogvorst, Johannes Schmidt. Improving Side-Channel Attacks by Exploiting Substitution Boxes Properties. International Conference on Boolean Functions: Cryptography and Applications (BFCA), May 2007, Paris, France. ⟨hal-02893245⟩



Record views