Performance Improvement of Power attack with Truncated Differential Cryptanalysis

부정차분을 이용한 전력분석공격 향상

  • 강태선 (고려대학교 정보보호대학원) ;
  • 김희석 (고려대학교 정보보호대학원) ;
  • 김태현 (고려대학교 정보보호대학원) ;
  • 김종성 (고려대학교 정보보호대학원) ;
  • 홍석희 (고려대학교 정보보호대학원)
  • Published : 2008.08.29

Abstract

In 1989, Kocher et al. introduced Differential Power Attack on block ciphers. This attack allows to extract secret key used in cryptographic computations even if these are executed inside tamper-resistant devices such as smart card. Since 1989, many papers were published to improve resistance of DPA. At FSE 2003 and 2004, Akkar and Goubin presented several masking methods to protect iterated block ciphers such as DES against Differential Power Attack. The idea is to randomize the first few and last few rounds(3 $\sim$ 4 round) of the cipher with independent random masks at each round and thereby disabling power attacks on subsequent inner rounds. This paper show how to combine truncated differential cryptanalysis applied to the first few rounds of the cipher with power attacks to extract the secret key from intermediate unmasked values.

Keywords