On Side Channel Vulnerabilities of Bit Permutations in Cryptographic Algorithms
Autor: | Shivam Bhasin, Dirmanto Jap, Jakub Breier, Xiaolu Hou |
---|---|
Přispěvatelé: | School of Computer Science and Engineering, Physical Analysis and Cryptographic Engineering Laboratory, Temasek Laboratories |
Rok vydání: | 2020 |
Předmět: |
021110 strategic
defence & security studies Computer Networks and Communications Computer science business.industry Side-channel Attacks 0211 other engineering and technologies Cryptography 02 engineering and technology Permutation Computer engineering Cipher Computer science and engineering::Data::Data encryption [Engineering] Key (cryptography) Side channel attack Safety Risk Reliability and Quality business Block Ciphers Block cipher |
Zdroj: | IEEE Transactions on Information Forensics and Security. 15:1072-1085 |
ISSN: | 1556-6021 1556-6013 |
Popis: | Lightweight block ciphers rely on simple operations to allow compact implementation. Thanks to its efficiency, bit permutation has emerged as an optimal choice for state-wise diffusion. It can be implemented by simple wiring in hardware or shifts in software. However, efficiency and security often go against each other. In this paper, we show how bit permutations introduce a side-channel vulnerability that can be exploited to extract the secret key from the cipher. Such vulnerabilities are specific to bit permutations and do not occur in other state-wise diffusion alternatives. We propose side-channel assisted differential-plaintext attack (SCADPA) which targets this vulnerability in the bit permutation operation. SCADPA is first experimentally demonstrated on PRESENT-80 on an 8-bit microcontroller, with the best case key recovery in 17 encryptions. In Addition, we adjust SCADPA to state-of-the-art bit sliced implementation from CHES'17 with experimental evaluation on a 32-bit microcontroller. The attack is then extended to latest bit-permutation-based cipher GIFT, allowing full key recovery in 36 encryptions. Application for reverse engineering of secret S-boxes in PRESENT-like proprietary ciphers is also shown. NRF (Natl Research Foundation, S’pore) Accepted version |
Databáze: | OpenAIRE |
Externí odkaz: |