[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Improving the Performance of CPA Attacks for Ciphers Using Parallel Implementation of S-Boxes

Published: 12 December 2023 Publication History

Abstract

Since their introduction in early 2000, CPA (correlation power analysis), as a cryptographic tool, has been widely used in the cryptanalysis of cryptographic algorithms (being applicable to both symmetric key ciphers as well as to public key encryption schemes). An application of the classical CPA method, along with its variants, to cryptographic algorithms that use parallel implementation of its substitution boxes (S-boxes) commonly requires more power traces to extract the secret key compared to the case when serial implementation of S-boxes is employed. To reduce the amount of power traces in this scenario, we propose a modification of the standard CPA approaches and demonstrate practically that our method performs better than the existing ones in this respect. To verify the efficiency of our improved CPA method, we apply it to the public databases of DPA Contest V2. In particular, the experimental results show that only 495 power traces are required to recover the secret key of AES. We also compare the performance of our attack to the relevant methods whose parameters are available at DPA Contest V2. The results show that compared to the best nonprofiling side-channel attack (SCA) attack, our method reduces the number of power traces required to recover the secret key by 6,566. Also, our new method performs almost similarly as the best profiling SCA attack of Benoit Gerard (in terms of the required number of power traces), thus reducing the gap in the performance of profiling and nonprofiling SCA attacks.

References

[1]
P. C. Kocher, “Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems,” in Advances in Cryptology—CRYPTO’96, vol. 1109 of Lecture Notes in Computer Science, N. Koblitz, Ed., pp. 104–113, Springer, Berlin, Heidelberg, 1996.
[2]
P. C. Kocher, J. Jaffe, and B. Jun, “Differential power analysis,” in Advances in Cryptology—CRYPTO’ 99, vol. 1666 of Lecture Notes in Computer Science, M. Wiener, Ed., pp. 388–397, Springer, Berlin, Heidelberg, 1999.
[3]
B.-S. Go, D.-V. Le, M.-G. Song, M. Park, and I.-K. Yu, “Design and electromagnetic analysis of an induction-type coilgun system with a pulse power module,” IEEE Transactions on Plasma Science, vol. 47, no. 1, pp. 971–976, 2019.
[4]
E. Brier, C. Clavier, and F. Olivier, “Correlation power analysis with a leakage model,” in Cryptographic Hardware and Embedded Systems—CHES 2004, vol. 3156 of Lecture Notes in Computer Science, M. Joye and J. J. Quisquater, Eds., pp. 16–29, Springer, Berlin, Heidelberg, 2004.
[5]
B. Gierlichs, L. Batina, P. Tuyls, and B. Preneel, “Mutual information analysis,” in Cryptographic Hardware and Embedded Systems—CHES 2008, vol. 5154 of Lecture Notes in Computer Science, E. Oswald and P. Rohatgi, Eds., pp. 426–442, Springer, Berlin, Heidelberg, 2008.
[6]
S. Chari, J. R. Rao, and P. Rohatgi, “Template attacks,” in Cryptographic Hardware and Embedded Systems—CHES 2002, vol. 2523 of Lecture Notes in Computer Science, B. S. Kaliski, Ç. K. Koç, and C. Paar, Eds., pp. 13–28, Springer, Berlin, Heidelberg, 2003.
[7]
W. Schindler, K. Lemke, and C. Paar, “A stochastic model for differential side channel cryptanalysis,” in Cryptographic Hardware and Embedded Systems—CHES 2005, vol. 3659 of Lecture Notes in Computer Science, J. R. Rao and B. Sunar, Eds., pp. 30–46, Springer, Berlin, Heidelberg, 2005.
[8]
G. Hospodar, B. Gierlichs, E. De Mulder, I. Verbauwhede, and J. Vandewalle, “Machine learning in side-channel analysis: a first study,” Journal of Cryptographic Engineering, vol. 1, no. 4, pp. 293–302, 2011.
[9]
F.-X. Standaert and C. Archambeau, “Using subspace-based template attacks to compare and combine power and electromagnetic information leakages,” in Cryptographic Hardware and Embedded Systems—CHES 2008, vol. 5154 of Lecture Notes in Computer Science, E. Oswald and P. Rohatgi, Eds., pp. 411–425, Springer, Berlin, Heidelberg, 2008.
[10]
J. G. J. van Woudenberg, M. F. Witteman, and B. Bakker, “Improving differential power analysis by elastic alignment,” in Topics in Cryptology—CT-RSA 2011, vol. 6558 of Lecture Notes in Computer Science, A. Kiayias, Ed., pp. 104–119, Springer, Berlin, Heidelberg, 2011.
[11]
L. Batina, J. Hogenboom, and J. G. J. van Woudenberg, “Getting more from PCA: first results of using principal component analysis for extensive power analysis,” in Topics in Cryptology—CT-RSA 2012, vol. 7178 of Lecture Notes in Computer Science, O. Dunkelman, Ed., pp. 383–397, Springer, Berlin, Heidelberg, 2012.
[12]
S. M. Del Pozo and F.-X. Standaert, “Blind source separation from single measurements using singular spectrum analysis,” 2016, Cryptology ePrint Archive Report 2016/314.
[13]
L. Wei, B. Luo, Y. Li, Y. Liu, and Q. Xu, “I know what you see: power side-channel attack on convolutional neural network accelerators,” in ACSAC ’18: Proceedings of the 34th Annual Computer Security Applications Conference, pp. 393–406, Association for Computing Machinery, December 2018.
[14]
A. Heuser, O. Rioul, and S. Guilley, Good is not good enough: deriving optimal distinguishers from communication theory, 2014, Cryptology ePrint Archive Report 2014/527.
[15]
S. Guilley, A. Heuser, and O. Rioul, “A key to success—success exponents for side-channel distinguishers,” in Progress in Cryptology—INDOCRYPT 2015, vol. 9462 of Lecture Notes in Computer Science, A. Biryukov and V. Goyal, Eds., pp. 270–290, Springer, Cham, 2015.
[16]
E. de Chérisey, S. Guilley, O. Rioul, and P. Piantanida, “Best information is most successful: mutual information and success rate in side-channel analysis,” IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2019, no. 2, pp. 49–79, 2019.
[17]
C. Glowacz, V. Grosso, R. Poussier, J. Schüth, and F.-X. Standaert, “Simpler and more efficient rank estimation for side-channel security assessment,” in Fast Software Encryption. FSE 2015, vol. 9054 of Lecture Notes in Computer Science, G. Leander, Ed., pp. 117–129, Springer, Berlin, Heidelberg, 2015.
[18]
L. David and A. Wool, “A bounded-space near-optimal key enumeration algorithm for multi-dimensional side-channel attacks,” 2015, Cryptology ePrint Archive Report 2015/1236.
[19]
D. P. Martin, L. Mather, and E. Oswald, “Two sides of the same coin: counting and enumerating keys post side-channel attacks revisited,” in Topics in Cryptology—CT-RSA 2018, vol. 10808 of Lecture Notes in Computer Science, N. Smart, Ed., pp. 394–412, Springer, Cham, 2018.
[20]
N. Veyrat-Charvillon, B. Gérard, and F.-X. Standaert, “Security evaluations beyond computing power,” in Advances in Cryptology —EUROCRYPT 2013, vol. 7881 of Lecture Notes in Computer Science, T. Johansson and P. Q. Nguyen, Eds., pp. 126–141, Springer, Berlin, Heidelberg, 2013.
[21]
D. J. Bernstein, T. Lange, and C. van Vredendaal, “Tighter, faster, simpler side-channel security evaluations beyond computing power,” 2015, Cryptology ePrint Archive Report 2015/221.
[22]
B. Timon, “Non-profiled deep learning-based side-channel attacks,” 2018, Cryptology ePrint Archive Report 2018/196.
[23]
A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” Communications of the ACM, vol. 60, no. 6, pp. 84–90, 2017.
[24]
Z. Martinasek, P. Dzurenda, and L. Malina, “Profiling power analysis attack based on mlp in DPA contest V4.2,” in 2016 39th International Conference on Telecommunications and Signal Processing (TSP), pp. 223–226, IEEE, Vienna, Austria, June 2016.
[25]
C. Clavier, B. Feix, G. Gagnerot, M. Roussellet, and V. Verneuil, “Improved collision-correlation power analysis on first order protected AES,” in Cryptographic Hardware and Embedded Systems—CHES 2011, vol. 6917 of Lecture Notes in Computer Science, B. Preneel and T. Takagi, Eds., pp. 49–62, Springer, Berlin, Heidelberg, 2011.
[26]
T.-H. Le, J. Clédière, C. Canovas, B. Robisson, C. Servière, and J.-L. Lacoume, “A proposition for correlation power analysis enhancement,” in Cryptographic Hardware and Embedded Systems—CHES 2006, vol. 4249 of Lecture Notes in Computer Science, L. Goubin and M. Matsui, Eds., pp. 174–186, Springer, Berlin, Heidelberg, 2006.
[27]
K. Yongdae, S. Takeshi, H. Naofumi, A. Takafumi, S. Akashi, A. Aza, and S.-S. Aoba-ku, “Biasing power traces to improve correlation in power analysis attacks,” in Proceedings of Constructive Side-Channel Analysis and Secure Design - COSADE 2010, pp. 77–80, Berlin, Heidelberg Springer, 2011.
[28]
Y. Komano, H. Shimizu, and S. Kawamura, “BS-CPA: built-in determined sub-key correlation power analysis,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E93-A, no. 9, pp. 1632–1638, 2010.
[29]
D. Oswald and C. Paar, “Improving side-channel analysis with optimal linear transforms,” in Smart Card Research and Advanced Applications. CARDIS 2012, vol. 7771 of Lecture Notes in Computer Science, S. Mangard, Ed., pp. 219–233, Springer, Berlin, Heidelberg, 2013.
[30]
Y. Kim and H. Ko, “Using principal component analysis for practical biasing of power traces to improve power analysis attacks,” in Information Security and Cryptology—ICISC 2013, vol. 8565 of Lecture Notes in Computer Science, H. S. Lee and D. G. Han, Eds., pp. 109–120, Springer, Cham, 2014.
[31]
Z. Zhang, L. Wu, A. Wang, Z. Mu, and X. Zhang, “A novel bit scalable leakage model based on genetic algorithm,” Security and Communication Networks, vol. 8, no. 18, pp. 3896–3905, 2015.
[32]
P. Robyns, P. Quax, and W. Lamotte, “Improving CEMA using correlation optimization,” IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2019, no. 1, pp. 1–24, 2018.
[33]
D. Kwon, H. Kim, and S. Hong, “Improving non-profiled side-channel attacks using autoencoder based preprocessing,” 2020, Cryptology ePrint Archive, Report 2020/396.
[34]
Y. Ding, Y. Shi, A. Wang, Y. Wang, and G. Zhang, “Block-oriented correlation power analysis with bitwise linear leakage: an artificial intelligence approach based on genetic algorithms,” Future Generation Computer Systems, vol. 106, pp. 34–42, 2020.
[35]
S. Press, W. Teukolsky, and B. Flannery, Numerical recipes in c++, Cambridge University Press, 2nd edition, 2002.
[36]
J. Xu, Y. Tang, Y. Wang, and X. Wang, “A practical side-channel attack of a lorawan module using deep learning,” in 2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID), pp. 17–21, IEEE, Xiamen, China, October 2019.
[37]
“DPA Contest,” 2008/2009, http://www.dpacontest.org/.
[38]
C. Clavier, J.-L. Danger, G. Duc, M. A. Elaabid, B. E.;t Gérard, S. Guilley, A. Heuser, M. Kasper, Y. Li, V. Lomné, D. Nakatsu, K. Ohta, K. Sakiyama, L. Sauvage, W. Schindler, M. Stöttinger, N. Veyrat-Charvillon, M. Walle, and A. Wurcker, “Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest,” Journal of Cryptographic Engineering, vol. 4, no. 4, pp. 259–274, 2014.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IET Information Security
IET Information Security  Volume 2023, Issue
2023
187 pages
This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Publisher

John Wiley & Sons, Inc.

United States

Publication History

Published: 12 December 2023

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media