[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3203217.3206428acmconferencesArticle/Chapter ViewAbstractPublication PagescfConference Proceedingsconference-collections
research-article

Higher order side-channel attack resilient S-boxes

Published: 08 May 2018 Publication History

Abstract

Masking schemes represent a well-researched and successful option to follow when considering side-channel countermeasures. Still, such measures increase the implementation cost in terms of power consumption, clock cycles, and random numbers generation. In fact, the higher the order of protection against side-channel adversaries, the higher the implementation cost of countermeasures. S-boxes represent the most vulnerable part in an implementation when considering side-channel adversary. In this paper, we investigate how to generate S-boxes that have improved resilience against varying orders of side-channel attacks while having minimal implementation costs. We examine whether S-boxes generated against a certain order of attack also represent a good solution when considering different order of attacks. We demonstrate that we successfully generated S-boxes resilient against a certain physical attack order but the improvements are small. As a result, S-boxes that are resilient against first order attacks stay resilient against higher-order attacks, which saves computational power during the design of higher-order side-channel attacks resilient S-boxes.

References

[1]
Lejla Batina, Benedikt Gierlichs, Emmanuel Prouff, Matthieu Rivain, François-Xavier Standaert, and Nicolas Veyrat-Charvillon. 2011. Mutual Information Analysis: a Comprehensive Study. J. Cryptology 24, 2 (2011), 269--291.
[2]
Claude Carlet. 2010. Vectorial Boolean Functions for Cryptography. In Boolean Models and Methods in Mathematics, Computer Science, and Engineering (1st ed.), Yves Crama and Peter L. Hammer (Eds.). Cambridge University Press, New York, USA, 398--469.
[3]
Claude Carlet, Louis Goubin, Emmanuel Prouff, Michaël Quisquater, and Matthieu Rivain. 2012. Higher-Order Masking Schemes for S-Boxes. In Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19--21, 2012. Revised Selected Papers (Lecture Notes in Computer Science), Anne Canteaut (Ed.), Vol. 7549. Springer, 366--384.
[4]
Claude Carlet, Emmanuel Prouff, Matthieu Rivain, and Thomas Roche. 2015. Algebraic Decomposition for Probing Security. In Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16--20, 2015, Proceedings, Part I (Lecture Notes in Computer Science), Rosario Gennaro and Matthew Robshaw (Eds.), Vol. 9215. Springer, 742--763.
[5]
Florent Chabaud and Serge Vaudenay. 1995. Links between differential and linear cryptanalysis. In Advances in Cryptology --- EUROCRYPT'94: Workshop on the Theory and Application of Cryptographic Techniques Perugia, Italy, May 9--12, 1994 Proceedings, Alfredo De Santis (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 356--365.
[6]
Kaushik Chakraborty, Sumanta Sarkar, Subhamoy Maitra, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, and Emmanuel Prouff. 2017. Redefining the transparency order. Des. Codes Cryptography 82, 1--2 (2017), 95--115.
[7]
Jean-Sébastien Coron, Paul C. Kocher, and David Naccache. 2000. Statistics and Secret Leakage. In Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20--24, 2000, Proceedings (Lecture Notes in Computer Science), Yair Frankel (Ed.), Vol. 1962. Springer, 157--173.
[8]
Jean-Sébastien Coron, Arnab Roy, and Srinivas Vivek. 2015. Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures. J. Cryptographic Engineering 5, 2 (2015), 73--83.
[9]
A. E. Eiben and J. E. Smith. 2003. Introduction to Evolutionary Computing. Springer-Verlag, Berlin Heidelberg New York, USA.
[10]
Vincent Grosso, Emmanuel Prouff, and François-Xavier Standaert. 2014. Efficient Masked S-Boxes Processing - A Step Forward -. In Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28--30, 2014. Proceedings (Lecture Notes in Computer Science), David Pointcheval and Damien Vergnaud (Eds.), Vol. 8469. Springer, 251--266.
[11]
Paul C. Kocher. 1996. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18--22, 1996, Proceedings (Lecture Notes in Computer Science), Neal Koblitz (Ed.), Vol. 1109. Springer, 104--113.
[12]
G. Leander and A. Poschmann. 2007. On the Classification of 4 Bit S-Boxes. In Arithmetic of Finite Fields, Claude Carlet and Berk Sunar (Eds.). Lecture Notes in Computer Science, Vol. 4547. Springer Berlin Heidelberg, 159--176.
[13]
Liran Lerman, Nikita Veshchikov, Stjepan Picek, and Olivier Markowitch. 2017. On the Construction of Side-Channel Attack Resilient S-boxes. In Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, COSADE 2017, Paris, France, April 13--14, 2017, Revised Selected Papers (Lecture Notes in Computer Science), Sylvain Guilley (Ed.), Vol. 10348. Springer, 102--119.
[14]
Kaisa Nyberg. 1991. Perfect Nonlinear S-Boxes. In Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8--11, 1991, Proceedings (Lecture Notes in Computer Science), Vol. 547. Springer, 378--386.
[15]
Kaisa Nyberg. 1993. On the construction of highly nonlinear permutations. In Advances in Cryptology - EUROCRYPT' 92, RainerA. Rueppel (Ed.). Lecture Notes in Computer Science, Vol. 658. Springer Berlin Heidelberg, 92--98.
[16]
Stjepan Picek, Lejla Batina, and Domagoj Jakobovic. 2014. Evolving DPA-Resistant Boolean Functions. In Parallel Problem Solving from Nature - PPSN XIII - 13th International Conference, Ljubljana, Slovenia, September 13--17, 2014. Proceedings (Lecture Notes in Computer Science), Thomas Bartz-Beielstein, Jürgen Branke, Bogdan Filipic, and Jim Smith (Eds.), Vol. 8672. Springer, 812--821.
[17]
Stjepan Picek, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, and Lejla Batina. 2015. Modified Transparency Order Property: Solution or Just Another Attempt. In Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Jaipur, India, 2015, Proceedings (Lecture Notes in Computer Science), Rajat Subhra Chakraborty, Peter Schwabe, and Jon A. Solworth (Eds.), Vol. 9354. Springer, 210--227.
[18]
Stjepan Picek, Kostas Papagiannopoulos, Baris Ege, Lejla Batina, and Domagoj Jakobovic. 2014. Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes. In Progress in Cryptology - INDOCRYPT 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14--17, 2014, Proceedings (Lecture Notes in Computer Science), Willi Meier and Debdeep Mukhopadhyay (Eds.), Vol. 8885. Springer, 374--390.
[19]
Emmanuel Prouff. 2005. DPA Attacks and S-Boxes. In Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21--23, 2005, Revised Selected Papers (Lecture Notes in Computer Science), Henri Gilbert and Helena Handschuh (Eds.), Vol. 3557. Springer, 424--441.
[20]
Jürgen Pulkus and Srinivas Vivek. 2016. Reducing the Number of Non-linear Multiplications in Masking Schemes. In Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17--19, 2016, Proceedings (Lecture Notes in Computer Science), Benedikt Gierlichs and Axel Y. Poschmann (Eds.), Vol. 9813. Springer, 479--497.
[21]
Eyal Ronen, Adi Shamir, Achi-Or Weingarten, and Colin O'Flynn. 2017. IoT Goes Nuclear: Creating a ZigBee Chain Reaction. In 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22--26, 2017. IEEE Computer Society, 195--212.
[22]
François-Xavier Standaert, Tal Malkin, and Moti Yung. 2009. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. In Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26--30, 2009. Proceedings (Lecture Notes in Computer Science), Antoine Joux (Ed.), Vol. 5479. Springer, 443--461.
[23]
Meltem Sönmez Turan and René Peralta. 2014. The Multiplicative Complexity of Boolean Functions on Four and Five Variables. In Lightweight Cryptography for Security and Privacy - Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1--2, 2014, Revised Selected Papers (Lecture Notes in Computer Science), Thomas Eisenbarth and Erdinç Öztürk (Eds.), Vol. 8898. Springer, 21--33.

Cited By

View all
  • (2022)Evolutionary computation and machine learning in securityProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3520304.3534087(1572-1601)Online publication date: 9-Jul-2022
  • (2021)Evolutionary computation and machine learning in cryptologyProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3449726.3461420(1089-1118)Online publication date: 7-Jul-2021
  • (2020)Evolutionary computation and machine learning in cryptologyProceedings of the 2020 Genetic and Evolutionary Computation Conference Companion10.1145/3377929.3389886(1147-1173)Online publication date: 8-Jul-2020
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CF '18: Proceedings of the 15th ACM International Conference on Computing Frontiers
May 2018
401 pages
ISBN:9781450357616
DOI:10.1145/3203217
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 May 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. S-box construction
  2. correlation power analysis
  3. genetic algorithms
  4. higher-order side-channel analysis

Qualifiers

  • Research-article

Conference

CF '18
Sponsor:
CF '18: Computing Frontiers Conference
May 8 - 10, 2018
Ischia, Italy

Acceptance Rates

Overall Acceptance Rate 273 of 785 submissions, 35%

Upcoming Conference

CF '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)1
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Evolutionary computation and machine learning in securityProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3520304.3534087(1572-1601)Online publication date: 9-Jul-2022
  • (2021)Evolutionary computation and machine learning in cryptologyProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3449726.3461420(1089-1118)Online publication date: 7-Jul-2021
  • (2020)Evolutionary computation and machine learning in cryptologyProceedings of the 2020 Genetic and Evolutionary Computation Conference Companion10.1145/3377929.3389886(1147-1173)Online publication date: 8-Jul-2020
  • (2019)Chosen message strategy to improve the correlation power analysisIET Information Security10.1049/iet-ifs.2018.510313:4(304-310)Online publication date: Jul-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media