DOI QR코드

DOI QR Code

Improved Side-Channel Attack on DES with the First Four Rounds Masked

  • Kim, Jong-Sung (Division of e-Business, Kyungnam University) ;
  • Hong, Seok-Hie (Center for Information Security Technologies (CIST), Korea University) ;
  • Han, Dong-Guk (Department of Mathematics, Kookmin University) ;
  • Lee, Sang-Jin (Center for Information Security Technologies (CIST), Korea University)
  • Received : 2009.05.11
  • Accepted : 2009.08.17
  • Published : 2009.10.31

Abstract

This letter describes an improved side-channel attack on DES with the first four rounds masked. Our improvement is based on truncated differentials and power traces which provide knowledge of Hamming weights for the intermediate data computed during the enciphering of plaintexts. Our results support the claim that masking several outer rounds rather than all rounds is not sufficient for the ciphers to be resistant to side-channel attacks.

Keywords

References

  1. National Bureau of Standards, “Data Encryption Standard,” Federal Information Processing Standards Publication 46, Jan. 1977.
  2. P.C. Kocher, J. Jaffe, and B. Jun, “Differential Power Analysis,” Proc. CRYPTO 1999, LNCS, vol. 1666, 1999 pp. 388-397.
  3. H. Handschuh and B. Preneel, “Blind Differential Cryptanalysis for Enhanced Power Attacks,” Proc. SAC 2006, LNCS, vol. 4356, 2007 pp. 163-173.
  4. L.R. Knudsen, “Truncated and Higher Order Differentials,” Proc. FSE 1994, LNCS, vol. 1008, 1995, pp. 196-211.
  5. M.L. Akkar, R. Bevan, and L. Goubin, “Two Power Analysis Attacks against One-Mask Methods,” Proc. CHES 2004, LNCS, vol. 3156, 2004, pp. 332-347.

Cited by

  1. Efficient Key Detection Method in the Correlation Electromagnetic Analysis Using Peak Selection Algorithm vol.11, pp.6, 2009, https://doi.org/10.1109/jcn.2009.6388409
  2. 축소 마스킹이 적용된 경량 블록 암호 LEA-128에 대한 부채널 공격 vol.25, pp.2, 2009, https://doi.org/10.13089/jkiisc.2015.25.2.253
  3. 축소 마스킹이 적용된 경량 블록 암호 알고리즘 SIMON 패밀리에 대한 부채널 공격 vol.27, pp.4, 2009, https://doi.org/10.13089/jkiisc.2017.27.4.923