DPA CONTEST 08/09 A SIMPLE IMPROVEMENT OF CLASSICAL CORRELATION POWER ANALYSIS ATTACK ON DES

Size: px
Start display at page:

Download "DPA CONTEST 08/09 A SIMPLE IMPROVEMENT OF CLASSICAL CORRELATION POWER ANALYSIS ATTACK ON DES"

Transcription

1 DPA CONTEST 08/09 A SIMPLE IMPROVEMENT OF CLASSICAL CORRELATION POWER ANALYSIS ATTACK ON DES, Fakultät für Informatik Antonio Almeida Prof. Dejan Lazich Karlsruhe, 9 th June 2010 KIT Universität des Landes Baden-Württemberg und nationales Großforschungszentrum in der Helmholtz-Gemeinschaft

2 DPA CONTEST ORGANIZATION August 2008 to August 30 th 2009 We began our participation in the contest: middle July 2009 Results debriefed at CHES2009, during a special session on September 7 th Organizers: Cryptographic Algorithm: Simple DES

3 GOALS Make it possible for researchers to objectively compare their different power attack algorithms on DES Construct a software in any programming language implementing an attack algorithm on a given set of power consumption traces Results/Ranking published on a Hall of Fame

4 DES Hardware Implementation message key Only one register everything else is combinatorial Just one round per clock period

5 Traces Experimental setup for traces acquisition

6 Database Entry DES Trace/file content Data Given entries 4 GByte Plaintext Secret Key Ciphertext Acquisition Date Filename Secret Key should not be used in the algorithm!!

7 Accessing the Data Remote ENST query answer Local download

8 Trace at encryption an example Measurements: points Preprocessing 16 DES Rounds Final processing

9 Trace with 16 DES rounds at encryption

10 CONTEST RULES Number of traces, N T,needed to guess the key Stability of the key algorithm continuously keeps the same guessed key when accumulating more traces Fixed threshold: 100 traces with the same key i.e. if the algorithm finds a certain key and keeps it for at least 100 traces, we consider that it has definitely found the key. Thus, the number of traces needed to find the key including the 100 stable traces is the mark given to an algorithm if the key found is the correct one min N T =101 Brute force should not be allowed for more than 8 bits of key #SBOXES 8 x = 56 bit key

11 CONTEST RULES evolution How to order the traces? 1st Proposal: Fixed Order Database entries accessed in a fixed order/database order given by the Contest Organizers NOT FAIR: this order influences the result; it does not strictly reflects the quality of the attack algorithm 2nd Proposal: Custom Order Database entries accessed in a chosen order defined by the contestant NOT FAIR: same reason as before; the contestant may look for a specific order instead of improving the quality of the algorithm

12 CONTEST RULES evolution 3rd and valid Proposal - Representative Order Database entries randomly accessed N T being the average on 1000 attacks FAIR: Order does NOT influence the result Critics about DPA Contest rules: Francois-Xavier Standaert, Philippe Bulens, Giacomo de Meulenaer, Nicolas ( 2008/517 Veyrat-Charvillon, Improving the Rules of the DPA Contest (eprint

13 DPA Reference Implementation ( 1998 ) Paul Kocher et al., Differential Power Analysis ciphertext Method originally proposed in the 16 th round Key hypothesis tested bit on output of SBOX Partition D=1 Partition D=0 differential trace power trace selection function/distinguisher current consumption proportional to 1 0 and 0 1 bit transitions

14 DPA Reference Implementation PLAINTEXT KEY

15 power DPA Reference Implementation Implemented in the 1 st round msg, trace peak subkey 1 4 des_breaker while key_stable < 100 () getnewtrace () processnewtrace () get_key numbertraces++ # subkeys subkey length/sbox input 8 x 6 = 48 bits last 8 bits with full search 1 4 des_breake sbox_breaker r sbox=1 des_break sbox_breaker er des_break sbox_breaker er des_break sbox_breaker er... sbox=2 sbox=3 sbox=4 sbox=8 des_breake r sbox_breaker skey=1 () D key=1 skey=2 key=1 skey=3 skey=64 key=1... () D () D () D... skey=1 () D key=1 skey=2 key=1 skey=3 skey=64 key=1... () D () D () D ( Distinguisher ) DPA selection function

16 Trace DES rounds hours calculating... 3 minutes and... ready

17 CPA Reference Implementation E. Brier, C. Clavier, F. Olivier, Correlation Power Analysis with a Leakage Model ( 2004 ) Idea: data leakage through the power side-channel depends on the number of bit transitions in a register during a clock cycle, at a given time Power trace i, for a reference state R Linear correlation factor message Number of traces Hamming distance between the previous and current state of the register

18 corr CPA Reference Implementation Implemented in the 1 st round msg, trace peak subkey 1 4 des_breaker while key_stable < 100 () getnewtrace () processnewtrace () get_key numbertraces++ # subkeys subkey length/sbox input 8 x 6 = 48 bits last 8 bits with full search 1 4 des_breake sbox_breaker r sbox=1 des_break sbox_breaker er des_break sbox_breaker er des_break sbox_breaker er... sbox=2 sbox=3 sbox=4 sbox=8 des_breake r sbox_breaker skey=1 () D key=1 skey=2 key=1 skey=3 skey=64 key=1... () D () D () D... skey=1 () D key=1 skey=2 key=1 skey=3 skey=64 key=1... () D () D () D ( Distinguisher ) selection function

19 CPA Reference Implementation PLAINTEXT KEY

20 CPA Reference Implementation PLAINTEXT KEY What about the left side?

21 A Simple Improvement of CPA by ( CPA-LS ) considering the left side Motivation Left-side is also responsible for current consumption, as it contributes with bit transitions If not taken into account, it will act as noise in the calculations, decreasing the SNR SNR and key stability are strongly related We should consider the influence of the left side when calculating the correlation coefficient in order to obtain key stability faster

22 Results Implementation Comparision #output bits considered in each SBOX 1-bit CPA 1-bit DPA 4-Bit CPA 4-Bit DPA 4-Bit CPA-LS traces traces traces traces traces 163 traces improvement with just one extra line of code!

23 USE OF PREVIOUS SUBKEY ESTIMATIONS IN THE NEXT SUBKEY ESTIMATION Problem: In the DPA calculations for a certain subkey/sbox, the other subkeys/sboxes interfere destructively, decreasing the SNR Solution: Consider the influence of each SBOX in the other SBOXES... SBOX1 SBOX2 SBOX3 SBOX4 SBOX5 SBOX6 SBOX7 SBOX8 SBOX8 However, some SBOXES are more stable than others

24 USE OF PREVIOUS SUBKEY ESTIMATIONS IN THE NEXT SUBKEY ESTIMATION Which SBOX permutation is the best one? SBOX1 SBOX2 SBOX3 SBOX4 SBOX5 SBOX6 SBOX7 SBOX8 8! = possibilities

25 USE OF PREVIOUS SUBKEY ESTIMATIONS IN THE NEXT SUBKEY ESTIMATION Problem: Find strategy to construct best SBOX permutation (Which SBOXES are more stable?) We tried a few strategies to find best permutation on the fly but... we lacked time to find a good one + sideleftconsideringcpa We believe that previoussubkeyestimations would considerably improve most of the results

26 Results Final standings Pos Author Method # traces 1 C. Limoges. Uni Clavier Maximum Likelihood 1 141,42 2 C. Limoges. Uni Clavier Maximum Likelihood 2 145,06 3 C. Clavier Limoges. Uni Maximum Likelihood 3 152,42 4 Montpellier. Lab Lomne BS-enhanced CPA Mitsubishi Saeki&Suzuki Dual round BS-CPA UniTohoku Kim. Y stochastic model attack 230,78 7. CorpToshiba Shimizu CPA with build-up technique 234,38 8 ParisTelecom Pacalet. R COP CPA 252,83 9. CorpToshiba Shimizu Alledged Max. Likelihood 253,73 10 ParisTelecom Pacalet. R COP CPA 265,

27 Results Final standings 13 KA. Uni Lazich&Almeida LS CPA 367, CorpToshiba Shimizu Classical DPA 371, CorpToshiba Shimizu Classical CPA 388,99 16 ParisTelecom Sauvage. L BS-CPA on 2-sboxes 149,00??? 17 Reference Implementation 4-bit DPA 485,35 18 Reference Implementation 4-bit CPA 530,45 19 Reference Implementation 1-bit DPA 1250,18 20 Reference Implementation 1-bit CPA 1435,

28 QUESTIONS?

Side channel attack: Power Analysis. Chujiao Ma, Z. Jerry Shi CSE, University of Connecticut

Side channel attack: Power Analysis. Chujiao Ma, Z. Jerry Shi CSE, University of Connecticut Side channel attack: Power Analysis Chujiao Ma, Z. Jerry Shi CSE, University of Connecticut Conventional Cryptanalysis Conventional cryptanalysis considers crypto systems as mathematical objects Assumptions:

More information

Countermeasures against EM Analysis

Countermeasures against EM Analysis Countermeasures against EM Analysis Paolo Maistri 1, SebastienTiran 2, Amine Dehbaoui 3, Philippe Maurine 2, Jean-Max Dutertre 4 (1) (2) (3) (4) Context Side channel analysis is a major threat against

More information

Power Analysis Attacks against FPGA Implementations of the DES

Power Analysis Attacks against FPGA Implementations of the DES Power Analysis Attacks against FPGA Implementations of the DES François-Xavier Standaert 1, Sıddıka Berna Örs2, Jean-Jacques Quisquater 1, Bart Preneel 2 1 UCL Crypto Group Laboratoire de Microélectronique

More information

HOST Differential Power Attacks ECE 525

HOST Differential Power Attacks ECE 525 Side-Channel Attacks Cryptographic algorithms assume that secret keys are utilized by implementations of the algorithm in a secure fashion, with access only allowed through the I/Os Unfortunately, cryptographic

More information

Breaking Korea Transit Card with Side-Channel Attack

Breaking Korea Transit Card with Side-Channel Attack Breaking Korea Transit Card with Side-Channel Attack -Unauthorized Recharging- Black Hat Asia 2017 Tae Won Kim, Tae Hyun Kim, and Seokhie Hong Outline 1. Attack Goal & Scenario 2. Target Device Details

More information

Masking as a Side-Channel Countermeasure in Hardware

Masking as a Side-Channel Countermeasure in Hardware Masking as a Side-Channel Countermeasure in Hardware 6. September 2016 Ruhr-Universität Bochum 1 Agenda Physical Attacks and Side Channel Analysis Attacks Measurement setup Power Analysis Attacks Countermeasures

More information

Power Analysis of MAC-Keccak: A Side Channel Attack. Advanced Cryptography Kyle McGlynn 4/12/18

Power Analysis of MAC-Keccak: A Side Channel Attack. Advanced Cryptography Kyle McGlynn 4/12/18 Power Analysis of MAC-Keccak: A Side Channel Attack Advanced Cryptography Kyle McGlynn 4/12/18 Contents Side-Channel Attack Power Analysis Simple Power Analysis (SPA) Differential Power Analysis (DPA)

More information

Towards a Software Approach to Mitigate Correlation Power Analysis

Towards a Software Approach to Mitigate Correlation Power Analysis Towards a Software Approach to Mitigate Correlation Power Analysis Ibraheem Frieslaar,2, Barry Irwin 2 Modelling and Digital Science, Council for Scientific and Industrial Research, Pretoria, South Africa.

More information

Improved Leakage Model Based on Genetic Algorithm

Improved Leakage Model Based on Genetic Algorithm Improved Leakage Model Based on Genetic Algorithm Zhenbin Zhang 1, Liji Wu 2, An Wang 3, Zhaoli Mu 4 May 4, 2014 Abstract. The classical leakage model usually exploits the power of one single S-box, which

More information

Second-Order Power Analysis Attacks against Precomputation based Masking Countermeasure

Second-Order Power Analysis Attacks against Precomputation based Masking Countermeasure , pp.259-270 http://dx.doi.org/10.14257/ijsh.2016.10.3.25 Second-Order Power Analysis Attacks against Precomputation based Masking Countermeasure Weijian Li 1 and Haibo Yi 2 1 School of Computer Science,

More information

Side Channel Analysis of an Automotive Microprocessor

Side Channel Analysis of an Automotive Microprocessor ISSC 2008, Galway. June 18 19 Side Channel Analysis of an Automotive Microprocessor Mark D. Hamilton, Michael Tunstall,EmanuelM.Popovici, and William P. Marnane Dept. of Microelectronic Engineering, Dept.

More information

External Encodings Do not Prevent Transient Fault Analysis

External Encodings Do not Prevent Transient Fault Analysis External Encodings Do not Prevent Transient Fault Analysis Christophe Clavier Gemalto, Security Labs CHES 2007 Vienna - September 12, 2007 Christophe Clavier CHES 2007 Vienna September 12, 2007 1 / 20

More information

Adaptive Chosen-Message Side-Channel Attacks

Adaptive Chosen-Message Side-Channel Attacks Adaptive Chosen-Message Side-Channel Attacks Nicolas Veyrat-Charvillon, François-Xavier Standaert, Université catholique de Louvain, Crypto Group, Belgium. e-mails: nicolas.veyrat;fstandae@uclouvain.be

More information

Power Analysis Attacks

Power Analysis Attacks Power Analysis Attacks Elisabeth Oswald Computer Science Department Crypto Group eoswald@cs.bris.ac.uk Elisabeth.Oswald@iaik.tugraz.at Outline Working principle of power analysis attacks DPA Attacks on

More information

Efficient DPA Attacks on AES Hardware Implementations

Efficient DPA Attacks on AES Hardware Implementations I. J. Communications, Network and System Sciences. 008; : -03 Published Online February 008 in SciRes (http://www.srpublishing.org/journal/ijcns/). Efficient DPA Attacks on AES Hardware Implementations

More information

The Davies-Murphy Power Attack. Sébastien Kunz-Jacques Frédéric Muller Frédéric Valette DCSSI Crypto Lab

The Davies-Murphy Power Attack. Sébastien Kunz-Jacques Frédéric Muller Frédéric Valette DCSSI Crypto Lab The Davies-Murphy Power Attack Sébastien Kunz-Jacques Frédéric Muller Frédéric Valette DCSSI Crypto Lab Introduction Two approaches for attacking crypto devices traditional cryptanalysis Side Channel Attacks

More information

Side-Channel Attack against RSA Key Generation Algorithms

Side-Channel Attack against RSA Key Generation Algorithms Side-Channel Attack against RSA Key Generation Algorithms CHES 2014 Aurélie Bauer, Eliane Jaulmes, Victor Lomné, Emmanuel Prouff and Thomas Roche Agence Nationale de la Sécurité des Systèmes d Information

More information

Towards a Software Approach to Mitigate Correlation Power Analysis

Towards a Software Approach to Mitigate Correlation Power Analysis Towards a Software Approach to Mitigate Correlation Power Analysis Ibraheem Frieslaar,2, Barry Irwin 2 Modelling and Digital Science, Council for Scientific and Industrial Research, Pretoria, South Africa.

More information

Once upon a time... A first-order chosen-plaintext DPA attack on the third round of DES

Once upon a time... A first-order chosen-plaintext DPA attack on the third round of DES A first-order chosen-plaintext DPA attack on the third round of DES Oscar Reparaz, Benedikt Gierlichs KU Leuven, imec - COSIC CARDIS 2017 Once upon a time... 14 November 2017 Benedikt Gierlichs - DPA on

More information

Non-Profiled Deep Learning-Based Side-Channel Attacks

Non-Profiled Deep Learning-Based Side-Channel Attacks Non-Profiled Deep Learning-Based Side-Channel Attacks Benjamin Timon UL Transaction Security, Singapore benjamin.timon@ul.com Abstract. Deep Learning has recently been introduced as a new alternative to

More information

Hardware Security. Debdeep Mukhopadhyay

Hardware Security. Debdeep Mukhopadhyay Hardware Security Debdeep Mukhopadhyay Secured Embedded Architecture Laboratory (SEAL) Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Kharagpur, West Bengal, INDIA

More information

Defeating Embedded Cryptographic Protocols by Combining Second-Order with Brute Force

Defeating Embedded Cryptographic Protocols by Combining Second-Order with Brute Force Defeating Embedded Cryptographic Protocols by Combining Second-Order with Brute Force Benoit Feix (B), Andjy Ricart, Benjamin Timon, and Lucille Tordella UL Transaction Security Lab, Basingstoke, England

More information

A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis

A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis V.S.Subarsana 1, C.K.Gobu 2 PG Scholar, Member IEEE, SNS College of Engineering, Coimbatore, India 1 Assistant Professor

More information

KeeLoq and Side-Channel Analysis Evolution of an Attack

KeeLoq and Side-Channel Analysis Evolution of an Attack KeeLoq and Side-Channel Analysis Evolution of an Attack Christof Paar, Thomas Eisenbarth, Markus Kasper, Timo Kasper and Amir Moradi Chair for Embedded Security Electrical Engineering and Information Sciences

More information

Breaking the Bitstream Decryption of FPGAs

Breaking the Bitstream Decryption of FPGAs Breaking the Bitstream Decryption of FPGAs 05. Sep. 2012 Amir Moradi Embedded Security Group, Ruhr University Bochum, Germany Acknowledgment Christof Paar Markus Kasper Timo Kasper Alessandro Barenghi

More information

Symmetric Key Algorithms. Definition. A symmetric key algorithm is an encryption algorithm where the same key is used for encrypting and decrypting.

Symmetric Key Algorithms. Definition. A symmetric key algorithm is an encryption algorithm where the same key is used for encrypting and decrypting. Symmetric Key Algorithms Definition A symmetric key algorithm is an encryption algorithm where the same key is used for encrypting and decrypting. 1 Block cipher and stream cipher There are two main families

More information

Secret Key Algorithms (DES) Foundations of Cryptography - Secret Key pp. 1 / 34

Secret Key Algorithms (DES) Foundations of Cryptography - Secret Key pp. 1 / 34 Secret Key Algorithms (DES) Foundations of Cryptography - Secret Key pp. 1 / 34 Definition a symmetric key cryptographic algorithm is characterized by having the same key used for both encryption and decryption.

More information

Linear Cryptanalysis of FEAL 8X Winning the FEAL 25 Years Challenge

Linear Cryptanalysis of FEAL 8X Winning the FEAL 25 Years Challenge Linear Cryptanalysis of FEAL 8X Winning the FEAL 25 Years Challenge Yaniv Carmeli Joint work with Prof. Eli Biham CRYPTODAY 2014 FEAL FEAL Published in 1987, designed by Miyaguchi and Shimizu (NTT). 64-bit

More information

Secret Key Algorithms (DES)

Secret Key Algorithms (DES) Secret Key Algorithms (DES) G. Bertoni L. Breveglieri Foundations of Cryptography - Secret Key pp. 1 / 34 Definition a symmetric key cryptographic algorithm is characterized by having the same key used

More information

Security against Timing Analysis Attack

Security against Timing Analysis Attack International Journal of Electrical and Computer Engineering (IJECE) Vol. 5, No. 4, August 2015, pp. 759~764 ISSN: 2088-8708 759 Security against Timing Analysis Attack Deevi Radha Rani 1, S. Venkateswarlu

More information

A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks

A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks Romain Poussier, François-Xavier Standaert: Université catholique de Louvain Yuanyuan Zhou:

More information

Hiding Higher-Order Leakages in Hardware

Hiding Higher-Order Leakages in Hardware Hiding Higher-Order Leakages in Hardware 21. May 2015 Ruhr-Universität Bochum Acknowledgement Pascal Sasdrich Tobias Schneider Alexander Wild 2 Story? Threshold Implementation should be explained? 1 st

More information

An Unsupervised Learning Model to Perform Side Channel Attack

An Unsupervised Learning Model to Perform Side Channel Attack An Unsupervised Learning Model to Perform Side Channel Attack Jung-Wei Chou 1, Min-Huang Chu 1, Yi-Lin Tsai 1, Yun Jin 2, Chen-Mou Cheng 2, and Shou-De Lin 1 1 Department of Computer Science National Taiwan

More information

An Improved DPA Attack on DES with Forth and Back Random Round Algorithm

An Improved DPA Attack on DES with Forth and Back Random Round Algorithm International Journal of Network Security, Vol.19, No.2, PP.285-294, Mar. 2017 (DOI: 10.6633/IJNS.201703.19(2).13) 285 An Improved DPA Attack on with Forth and Back Random Round Algorithm Cai-Sen Chen

More information

Fault Sensitivity Analysis

Fault Sensitivity Analysis Fault Sensitivity Analysis Yang Li, Kazuo Sakiyama, Shigeto Gomisawa, Kazuo Ohta The University of Electro-Communications liyang@ice.uec.ac.jp Toshinori Fukunaga, Junko Takahashi NTT Information Sharing

More information

FDTC 2010 Fault Diagnosis and Tolerance in Cryptography. PACA on AES Passive and Active Combined Attacks

FDTC 2010 Fault Diagnosis and Tolerance in Cryptography. PACA on AES Passive and Active Combined Attacks FDTC 21 Fault Diagnosis and Tolerance in Cryptography PACA on AES Passive and Active Combined Attacks Christophe Clavier Benoît Feix Georges Gagnerot Mylène Roussellet Limoges University Inside Contactless

More information

Chapter 2 Introduction to Side-Channel Attacks

Chapter 2 Introduction to Side-Channel Attacks Chapter 2 Introduction to Side-Channel Attacks François-Xavier Standaert 2.1 Introduction A cryptographic primitive can be considered from two points of view: on the one hand, it can be viewed as an abstract

More information

Profiling Good Leakage Models For Masked Implementations

Profiling Good Leakage Models For Masked Implementations Profiling Good Leakage Models For Masked Implementations Changhai Ou,2, Zhu Wang,, Degang Sun, and Xinping Zhou,2 Institute of Information Engineering, Chinese Academy of Sciences 2 School of Cyber Security,

More information

Practical Electromagnetic Template Attack on HMAC

Practical Electromagnetic Template Attack on HMAC Practical Electromagnetic Template Attack on HMAC Pierre Alain Fouque 1 Gaétan Leurent 1 Denis Réal 2,3 Frédéric Valette 2 1ENS,75Paris,France. 2CELAR,35Bruz,France. 3INSA-IETR,35Rennes,France. September

More information

Attack on DES. Jing Li

Attack on DES. Jing Li Attack on DES Jing Li Major cryptanalytic attacks against DES 1976: For a very small class of weak keys, DES can be broken with complexity 1 1977: Exhaustive search will become possible within 20 years,

More information

Countering power analysis attacks by exploiting characteristics of multicore processors

Countering power analysis attacks by exploiting characteristics of multicore processors This article has been accepted and published on J-STAGE in advance of copyediting. Content is final as presented. IEICE Electronics Express, Vol.*, o.*, 1 11 Countering power analysis attacks by exploiting

More information

Exploiting Machine Learning Techniques to Perform Side Channel Attack

Exploiting Machine Learning Techniques to Perform Side Channel Attack Exploiting Machine Learning Techniques to Perform Side Channel Attack Jung-Wei Chou, Yi-Lin Tsai, Min-Huang Chu, Shou-De Lin, Yun Jin, and Chen-Mou Cheng Department of Computer Science and Information

More information

SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017

SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017 SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017 WHAT WE DO What we do Robust and Efficient Cryptographic Protocols Research in Cryptography and

More information

Multi-Stage Fault Attacks

Multi-Stage Fault Attacks Multi-Stage Fault Attacks Applications to the Block Cipher PRINCE Philipp Jovanovic Department of Informatics and Mathematics University of Passau March 27, 2013 Outline 1. Motivation 2. The PRINCE Block

More information

Complementing Feistel Ciphers

Complementing Feistel Ciphers Ivica Nikolić (joint work with Alex Biryukov) Nanyang Technological University, Singapore University of Luxembourg, Luxembourg 11 March 2013 1 Complementation Property 2 General Complementation Property

More information

A Simple Power Analysis Attack Against the Key Schedule of the Camellia Block Cipher

A Simple Power Analysis Attack Against the Key Schedule of the Camellia Block Cipher A Simple Power Analysis Attack Against the Key Schedule of the Camellia Block Cipher Lu Xiao and Howard M. Heys 2 QUALCOMM Incorporated, lxiao@qualcomm.com 2 Electrical and Computer Engineering, Faculty

More information

Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs

Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs Amir Moradi and Gesine Hinterwälder Horst Görtz Institute for IT-Security, Ruhr-Universität Bochum, Germany {amir.moradi, gesine.hinterwaelder}@rub.de

More information

Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks

Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks A Practical Security Evaluation on FPGA Florian Unterstein Johann Heyszl Fabrizio De Santis a Robert Specht, 13.04.2017 a Technical

More information

Improved Brute Force Search Strategies for Single Trace and Few Traces Template Attacks on the DES Round Keys

Improved Brute Force Search Strategies for Single Trace and Few Traces Template Attacks on the DES Round Keys Improved Brute Force Search Strategies for Single Trace and Few Traces Template Attacks on the DES Round Keys Mathias Wagner, Stefan Heyse mathias.wagner@nxp.com Abstract. We present an improved search

More information

Experiments in Attacking FPGA-Based Embedded Systems using Differential Power Analysis

Experiments in Attacking FPGA-Based Embedded Systems using Differential Power Analysis Experiments in Attacking FPGA-Based Embedded Systems using Differential Power Analysis Song Sun Zijun Yan Joseph Zambreno Dept. of Electrical and Computer Engineering Iowa State University Ames, IA 50011

More information

Side-channel Analysis of Grøstl and Skein

Side-channel Analysis of Grøstl and Skein 2012 IEEE IEEE Symposium CS Security on Security and Privacy and Workshops Privacy Workshops Side-channel Analysis of Grøstl and Skein Christina Boura, Sylvain Lévêque, David Vigilant Gemalto 6 rue de

More information

A novel bit scalable leakage model based on genetic algorithm

A novel bit scalable leakage model based on genetic algorithm SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2015; 8:3896 3905 Published online 24 August 2015 in Wiley Online Library (wileyonlinelibrary.com)..1308 RESEARCH ARTICLE A novel bit scalable

More information

Principal Component Analysis and Side-Channel Attacks - Master Thesis

Principal Component Analysis and Side-Channel Attacks - Master Thesis Principal Component Analysis and Side-Channel Attacks - Master Thesis Jip Hogenboom Department of Computing Science Digital Security Radboud University Nijmegen, The Netherlands August, 2010 J.Hogenboom@student.ru.nl

More information

On the Optimality of Mutual Information Analysis for Discrete Leakages Cryptarchi June 29-30, 2015 Leuven

On the Optimality of Mutual Information Analysis for Discrete Leakages Cryptarchi June 29-30, 2015 Leuven On the Optimality of Mutual Information Analysis for Discrete Leakages Cryptarchi June 29-30, 2015 Leuven Éloi de Chérisey*, Annelie Heuser**, Sylvain Guilley** and Olivier Rioul** * ENS Cachan, **Telecom

More information

Deep Learning for Embedded Security Evaluation

Deep Learning for Embedded Security Evaluation Deep Learning for Embedded Security Evaluation Emmanuel Prouff 1 1 Laboratoire de Sécurité des Composants, ANSSI, France April 2018, CISCO April 2018, CISCO E. Prouff 1/22 Contents 1. Context and Motivation

More information

Lecture Note 9 ATTACKS ON CRYPTOSYSTEMS II. Sourav Mukhopadhyay

Lecture Note 9 ATTACKS ON CRYPTOSYSTEMS II. Sourav Mukhopadhyay Lecture Note 9 ATTACKS ON CRYPTOSYSTEMS II Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Birthday attack The Birthday attack makes use of what s known as the Birthday paradox to try to

More information

Leakage-Resilient Symmetric Cryptography (Overview of the ERC Project CRASH, part II)

Leakage-Resilient Symmetric Cryptography (Overview of the ERC Project CRASH, part II) Leakage-Resilient Symmetric Cryptography (Overview of the ERC Project CRASH, part II) François-Xavier Standaert UCL Crypto Group, Belgium INDOCRYPT, December 2016 Outline Introduction Natural PRGs/PRFs

More information

Fundamentals of Cryptography

Fundamentals of Cryptography Fundamentals of Cryptography Topics in Quantum-Safe Cryptography June 23, 2016 Part III Data Encryption Standard The Feistel network design m m 0 m 1 f k 1 1 m m 1 2 f k 2 2 DES uses a Feistel network

More information

Wenling Wu, Lei Zhang

Wenling Wu, Lei Zhang LBlock: A Lightweight Block Cipher Wenling Wu, Lei Zhang Institute t of Software, Chinese Academy of Sciences 09-Jun-2011 Outline Background and Previous Works LBlock: Specification Design Rationale Security

More information

Network Security Technology Project

Network Security Technology Project Network Security Technology Project Shanghai Jiao Tong University Presented by Wei Zhang zhang-wei@sjtu.edu.cn!1 Part I Implement the textbook RSA algorithm. The textbook RSA is essentially RSA without

More information

International Journal for Research in Applied Science & Engineering Technology (IJRASET) Performance Comparison of Cryptanalysis Techniques over DES

International Journal for Research in Applied Science & Engineering Technology (IJRASET) Performance Comparison of Cryptanalysis Techniques over DES Performance Comparison of Cryptanalysis Techniques over DES Anupam Kumar 1, Aman Kumar 2, Sahil Jain 3, P Kiranmai 4 1,2,3,4 Dept. of Computer Science, MAIT, GGSIP University, Delhi, INDIA Abstract--The

More information

A Power Attack Method Based on Clustering Ruo-nan ZHANG, Qi-ming ZHANG and Ji-hua CHEN

A Power Attack Method Based on Clustering Ruo-nan ZHANG, Qi-ming ZHANG and Ji-hua CHEN 2017 International Conference on Computer, Electronics and Communication Engineering (CECE 2017) ISBN: 978-1-60595-476-9 A Power Attack Method Based on Clustering Ruo-nan ZHANG, Qi-ming ZHANG and Ji-hua

More information

A physical level perspective

A physical level perspective UMass CS 660 Advanced Information Assurance Spring 2011Guest Lecture Side Channel Analysis A physical level perspective Lang Lin Who am I 5 th year PhD candidate in ECE Advisor: Professor Wayne Burleson

More information

Synthesis of Fault-Attack Countermeasures for Cryptographic Circuits

Synthesis of Fault-Attack Countermeasures for Cryptographic Circuits Synthesis of Fault-Attack Countermeasures for Cryptographic Circuits Hassan Eldib, Meng Wu, and Chao Wang CAV, July 23, 2016 Cryptographic Algorithm: an example Plaintext Chip Ciphertext 0110 1001 1011

More information

Correlated Power Noise Generator as a Low Cost DPA Countermeasures to Secure Hardware AES Cipher

Correlated Power Noise Generator as a Low Cost DPA Countermeasures to Secure Hardware AES Cipher Correlated Power Noise Generator as a Low Cost DPA Countermeasures to Secure Hardware AES Cipher Najeh Kamoun 1, Lilian Bossuet 2, and Adel Ghazel 1 1 CIRTA COM, SUP COM 2 IMS, University of Bordeaux Tunis,

More information

Experience Using a Low-Cost FGPA Design to Crack DES Keys

Experience Using a Low-Cost FGPA Design to Crack DES Keys Experience Using a Low-Cost FGPA Design to Crack DES Keys Michael Bond & Richard Clayton &+(6:RUNVKRS WK $XJXVW Contents Attacks on the IBM 4758 CCA Attack optimisation History of H/W crackers The low-cost

More information

PRACTICAL DPA ATTACKS ON MDPL. Elke De Mulder, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede

PRACTICAL DPA ATTACKS ON MDPL. Elke De Mulder, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede PRACTICAL DPA ATTACKS ON MDPL Elke De Mulder, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede K.U. Leuven, ESAT/SCD-COSIC and IBBT Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {elke.demulder,benedikt.gierlichs,bart.preneel,ingrid.verbauwhede}@esat.kuleuven.be

More information

Differential Power Analysis of MAC-Keccak at Any Key-Length

Differential Power Analysis of MAC-Keccak at Any Key-Length Differential Power Analysis of MAC-Keccak at Any Key-Length Mostafa Taha and Patrick Schaumont Secure Embedded Systems Center for Embedded Systems for Critical Applications Bradley Department of ECE Virginia

More information

An Optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks

An Optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks An Optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks Nicolas Veyrat-Charvillon, Benoît Gérard, Mathieu Renauld, François-Xavier Standaert UCL Crypto Group, Université catholique

More information

Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines

Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines Alexandre Venelli 1,2 1 IML ERISCS Université delaméditerranée, Case 97, 163 Avenue de Luminy 13288 Marseille Cedex 9, France

More information

Introduction to Software Countermeasures For Embedded Cryptography

Introduction to Software Countermeasures For Embedded Cryptography Introduction to Software Countermeasures For Embedded Cryptography David Vigilant UMPC Master, 1 st December, 2017 Outline 1 Context and Motivations 2 Basic Rules and Countermeasures Examples Regarding

More information

Memory Address Side-Channel Analysis on Exponentiation

Memory Address Side-Channel Analysis on Exponentiation Memory Address Side-Channel Analysis on Exponentiation Chien-Ning Chen Physical Analysis & Cryptographic Engineering (PACE) Nanyang Technological University, Singapore chienning@ntu.edu.sg Abstract. Side-channel

More information

Spread: a new layer for profiled deep-learning side-channel attacks

Spread: a new layer for profiled deep-learning side-channel attacks Spread: a new layer for profiled deep-learning side-channel attacks Christophe Pfeifer 1,2 and Patrick Haddad 3 1 Karlsruhe Institute of Technology, Karlsruhe, Germany 2 Grenoble INP - Ensimag, Grenoble,

More information

Correlated Power Noise Generator as a Low Cost DPA Countermeasure to Secure Hardware AES Cipher

Correlated Power Noise Generator as a Low Cost DPA Countermeasure to Secure Hardware AES Cipher Author manuscript, published in "Proceeding of the 3rd IEEE International Conference on Signals, Circuits and Systems, SCS 2009, pp. 1-6, Djerba, Tunisa, November 2009., Tunisia (2009)" Correlated Power

More information

Practice of Software Development: Dynamic scheduler for scientific simulations

Practice of Software Development: Dynamic scheduler for scientific simulations Practice of Software Development: Dynamic scheduler for scientific simulations @ SimLab EA Teilchen STEINBUCH CENTRE FOR COMPUTING - SCC KIT Universität des Landes Baden-Württemberg und nationales Forschungszentrum

More information

Computational Security, Stream and Block Cipher Functions

Computational Security, Stream and Block Cipher Functions Computational Security, Stream and Block Cipher Functions 18 March 2019 Lecture 3 Most Slides Credits: Steve Zdancewic (UPenn) 18 March 2019 SE 425: Communication and Information Security 1 Topics for

More information

PARAMETRIC TROJANS FOR FAULT-BASED ATTACKS ON CRYPTOGRAPHIC HARDWARE

PARAMETRIC TROJANS FOR FAULT-BASED ATTACKS ON CRYPTOGRAPHIC HARDWARE PARAMETRIC TROJANS FOR FAULT-BASED ATTACKS ON CRYPTOGRAPHIC HARDWARE Raghavan Kumar, University of Massachusetts Amherst Contributions by: Philipp Jovanovic, University of Passau Wayne P. Burleson, University

More information

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa ICT 6541 Applied Cryptography Hossen Asiful Mustafa Encryption & Decryption Key (K) Plaintext (P) Encrypt (E) Ciphertext (C) C = E K (P) Same Key (K) Ciphertext (C) Decrypt (D) Plaintext (P) P = D K (C)

More information

A testing methodology for side channel resistance validation

A testing methodology for side channel resistance validation A testing methodology for side channel resistance validation Gilbert Goodwill, Benjamin Jun, Josh Jaffe, Pankaj Rohatgi: Cryptography Research Inc. Keywords: side channel testing, leakage analysis, t test

More information

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 08r. Pre-exam 2 Last-minute Review Cryptography Paul Krzyzanowski Rutgers University Spring 2018 March 26, 2018 CS 419 2018 Paul Krzyzanowski 1 Cryptographic Systems March 26, 2018 CS

More information

A Weight Based Attack on the CIKS-1 Block Cipher

A Weight Based Attack on the CIKS-1 Block Cipher A Weight Based Attack on the CIKS-1 Block Cipher Brian J. Kidney, Howard M. Heys, Theodore S. Norvell Electrical and Computer Engineering Memorial University of Newfoundland {bkidney, howard, theo}@engr.mun.ca

More information

Analysis and Improvements of the DPA Contest v4 Implementation

Analysis and Improvements of the DPA Contest v4 Implementation Analysis and Improvements of the DPA Contest v4 Implementation Shivam BHASIN 1, Nicolas BRUNEAU 1,2, Jean-Luc DANGER 1,3, Sylvain GUILLEY 1,3 and Zakaria NAJM 1 1 TELECOM-ParisTech, Crypto Group, Paris,

More information

Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure

Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure Fourth International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2013) Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure Takafumi Hibiki*, Naofumi Homma*,

More information

Selecting Time Samples for Multivariate DPA Attacks

Selecting Time Samples for Multivariate DPA Attacks Selecting Time Samples for Multivariate DPA Attacks Oscar Reparaz, Benedikt Gierlichs, and Ingrid Verbauwhede KU Leuven Dept. Electrical Engineering-ESAT/SCD-COSIC and IBBT Kasteelpark Arenberg 10, B-3001

More information

Test Vector Leakage Assessment (TVLA) Derived Test Requirements (DTR) with AES

Test Vector Leakage Assessment (TVLA) Derived Test Requirements (DTR) with AES Test Vector Leakage Assessment (TVLA) Derived Test Requirements (DTR) with AES 1 Document Scope This document describes requirements and test procedures for qualifying DPA-resistant implementations of

More information

Guided Analysis of WS3

Guided Analysis of WS3 Guided Analysis of WS3 DPA Attacks with Windowing on AES Encryptions with Dummy Operations 15 April 2010, Version 1.0 Thomas Popp IAIK Graz University of Technology Thomas.Popp@iaik.tugraz.at www.iaik.tugraz.at

More information

A Reliable Architecture for Substitution Boxes in Integrated Cryptographic Devices

A Reliable Architecture for Substitution Boxes in Integrated Cryptographic Devices Author manuscript, published in "DCIS'08: Conference on Design of Circuits and Integrated Systems, (2008)" A Reliable Architecture for Substitution Boxes in Integrated Cryptographic Devices G. Di Natale,

More information

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs, suitable for DFA on AES

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs, suitable for DFA on AES , suitable for DFA on AES Jonas Krautter, Dennis R.E. Gnad, Mehdi B. Tahoori 10.09.2018 INSTITUTE OF COMPUTER ENGINEERING CHAIR OF DEPENDABLE NANO COMPUTING KIT Die Forschungsuniversität in der Helmholtz-Gemeinschaft

More information

A machine learning approach against a masked AES

A machine learning approach against a masked AES J Cryptogr Eng (215) 5: 139 DOI 1.17/s13389-14-89-3 REGULAR PAPER A machine learning approach against a masked AES Reaching the limit of side-channel attacks with a learning model Liran Lerman Gianluca

More information

A New Attack with Side Channel Leakage during Exponent Recoding Computations

A New Attack with Side Channel Leakage during Exponent Recoding Computations A New Attack with Side Channel Leakage during Exponent Recoding Computations Yasuyuki Sakai 1 and Kouichi Sakurai 2 1 Mitsubishi Electric Corporation, 5-1-1 Ofuna, Kamakura, Kanagawa 247-8501, Japan ysakai@iss.isl.melco.co.jp

More information

Block Ciphers and Data Encryption Standard. CSS Security and Cryptography

Block Ciphers and Data Encryption Standard. CSS Security and Cryptography Block Ciphers and Data Encryption Standard CSS 322 - Security and Cryptography Contents Block Cipher Principles Feistel Structure for Block Ciphers DES Simplified DES Real DES DES Design Issues CSS 322

More information

Mike Hamburg. August 1, Abstract

Mike Hamburg. August 1, Abstract Cryptanalysis of 22 1 2 rounds of Gimli Mike Hamburg August 1, 2017 Abstract Bernstein et al. have proposed a new permutation, Gimli, which aims to provide simple and performant implementations on a wide

More information

Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice

Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice Alex Biryukov, Daniel Dinu, and Johann Großschädl SnT, University of Luxembourg 6, rue Richard Coudenhove-Kalergi, L 1359

More information

Side Channel Attacks: A Primer

Side Channel Attacks: A Primer Side Channel Attacks: A Primer Debdeep Mukhopadhyay Department of Computer Science and Engineering IIT debdeep@cse.iitkgp.ernet.in 1 THE BIRD S EYE VIEW Of Secrecy I am Silence Bhagavad Gita, Vibhuti Yoga,

More information

ECRYPT II Workshop on Physical Attacks November 27 th, Graz, Austria. Stefan Mangard.

ECRYPT II Workshop on Physical Attacks November 27 th, Graz, Austria. Stefan Mangard. Building Secure Hardware ECRYPT II Workshop on Physical Attacks November 27 th, Graz, Austria Stefan Mangard Infineon Technologies, Munich, Germany Stefan.Mangard@infineon.com Outline Assets and Requirements

More information

Implementing Virtual Secure Circuit Using A Custom-Instruction Approach

Implementing Virtual Secure Circuit Using A Custom-Instruction Approach Implementing Virtual Secure Circuit Using A Custom-Instruction Approach Zhimin Chen Virginia Tech. Blacksburg, VA 246 chenzm@vt.edu Ambuj Sinha Virginia Tech. Blacksburg, VA 246 ambujs87@vt.edu Patrick

More information

Masking vs. Multiparty Computation: How Large is the Gap for AES?

Masking vs. Multiparty Computation: How Large is the Gap for AES? Masking vs. Multiparty Computation: How Large is the Gap for AES? Vincent Grosso 1, François-Xavier Standaert 1, Sebastian Faust 2. 1 ICTEAM/ELEN/Crypto Group, Université catholique de Louvain, Belgium.

More information

«Safe (hardware) design methodologies against fault attacks»

«Safe (hardware) design methodologies against fault attacks» «Safe (hardware) design methodologies against fault attacks» Bruno ROBISSON Assia TRIA SESAM Laboratory (joint R&D team CEA-LETI/EMSE), Centre Microélectronique de Provence Avenue des Anémones, 13541 Gardanne,

More information

Breaking Speck cryptosystem using correlation power analysis attack

Breaking Speck cryptosystem using correlation power analysis attack J.Natn.Sci.Foundation Sri Lanka 2017 45 (4): 393-404 DOI: http://dx.doi.org/10.4038/jnsfsr.v45i4.8233 RESEARCH ARTICLE Breaking Speck cryptosystem using correlation power analysis attack Hasindu Gamaarachchi

More information

Power Analysis of MAC-Keccak: A Side Channel Attack

Power Analysis of MAC-Keccak: A Side Channel Attack Power Analysis of MAC-Keccak: A Side Channel Attack Advanced Cryptography Kyle McGlynn Professor Stanislaw Radziszowski May 6, 2018 1 Introduction Recently in the spring of 2017, two documents were discovered

More information