DOI QR코드

DOI QR Code

New Type of Collision Attack on Power-Analysis Resistant AES

전력 분석에 안전한 AES에 대한 새로운 종류의 충돌쌍 공격

  • 김희석 (한국과학기술정보연구원 과학기술정보보호실) ;
  • 박학수 (한국과학기술정보연구원 과학기술정보보호실) ;
  • 홍석희 (고려대학교 정보보호대학원)
  • Received : 2013.04.16
  • Accepted : 2013.08.06
  • Published : 2013.09.30

Abstract

This paper introduces a new collision attack on first-order masked AES. This attack is a known plaintext attack, while the existing collision attacks are a chosen plaintext attack. In addition, our method is more efficient than the second-order power analysis and requires about 1/27.5 power measurements by comparison with the last collision attack. Some experiment results of this paper support this fact. In this paper, we also introduce a simple countermeasure, which can protect against our attack.

본 논문에서는 일차 전력 분석에 안전한 AES의 마스킹 기법을 분석할 수 있는 새로운 충돌쌍 공격을 제안한다. 제안하는 충돌쌍 공격은 기존 충돌쌍 공격의 단점인 선택 평문 공격의 단점을 극복하고 기지 평문 공격이 가능하도록 구성되어진다. 또한 제안하는 분석기법은 이차 전력분석보다 효율적이며 최근 제안된 충돌쌍 공격에 요구되는 파형 개수에 비해 약 1/27.5배의 파형만을 요구한다. 논문에 포함된 실험 결과들은 이러한 사실을 뒷받침한다. 본 논문에서는 또한 새로운 분석 기법과 함께 이 방법을 방어할 수 있는 간단한 대응방법을 소개하도록 한다.

Keywords

References

  1. P. Kocher, J. Jaffe, B. Jun, "Differential Power Analysis", Crypto 1999, LNCS 1666, pp.388-397, Springer-Verlag, 1999.
  2. M.-L. Akkar, C. Giraud, "An Implementation of DES and AES, Secure against Some Attacks", CHES 2001, LNCS 2162, pp. 309-318, Springer-Verlag, 2001.
  3. J. Blomer, J. Guajardo, V. Krummel, "Provably Secure Masking of AES", SEC 2005, LNCS 3357, pp.69-83, Springer-Verlag, 2005.
  4. C. Herbst, E. Oswald, S. Mangard, "An AES Smart Card Implementation Resistant to Power Analysis Attacks", ACNS 2006, LNCS 3989, pp.239-252, Springer-Verlag, 2006.
  5. H. Kim, T.H. Kim, D.-G. Han, S. Hong, "Efficient Masking Methods Appropriate for the Block Ciphers ARIA and AES", ETRI Journal. Vol.32, No.3. 2010, pp.370-379. https://doi.org/10.4218/etrij.10.0109.0181
  6. E. Oswald, S. Mangard, N. Pramstaller, "A Side-Channel Analysis Resistant Description of the AES S-Box", FSE 2005, LNCS 3557, pp.199-228, Springer-Verlag, 2005.
  7. E. Oswald, K. Schramm, "An Efficient Masking Scheme for AES Software Implementations", WISA 2005, LNCS 3786, pp. 292-305, Springer-Verlag, 2006.
  8. H. Kim, Y.I. Cho, D. Choi, D.-G. Han, S. Hong, "Efficient Masked Implementation for SEED Based on Combined Masking," ETRI Journal. Vol.33, No.2, 2011, pp.267-274. https://doi.org/10.4218/etrij.11.1510.0112
  9. T. Messerges, "Using Second-Order Power Analysis to Attack DPA Resistant Software", CHES 2000, LNCS 1965, pp. 238-251, Springer-Verlag, 2000.
  10. M. Joye, P. Paillier, B. Schoenmakers, "On Second-Order Differential Power Analysis", CHES 2005, LNCS 3659, pp. 293-308, Springer-Verlag, 2005.
  11. E. Oswald, S. Mangard, C. Herbst, and S. Tillich, "Practical second-order DPA attacks for masked smart card implementations of block ciphers", CT-RSA 2006, LNCS 3860, pp.192-207, Springer-Verlag, 2006.
  12. K. Schramm, C. Paar, and D. Pointcheval, "Higher Order Masking of the AES", CT-RSA 2006, LNCS 3860, pp. 208-225, Springer-Verlag, 2006.
  13. E. Prouff, M. Rivain, and R. Bevan, "Statistical Analysis of Second Order Differential Power Analysis", IEEE Transactions on Computers, Vol.58, No.6. 2009, pp.799-811. https://doi.org/10.1109/TC.2009.15
  14. K. Schramm, G. Leander, P. Felke, C. Paar, "A Collision Attack on AES: Combining Side Channel and Differential Attack", CHES 2004, LNCS 3156, pp.163-175, Springer- Verlag, 2004.
  15. A. Bogdanov, "Improved Side-Channel Collision Attacks on AES", SAC 2007, LNCS 4876, pp.84-95. Springer-Verlag, 2007.
  16. A. Moradi, O. Mischke, and T. Eisenbarth, "Correlation- Enhanced Power Analysis Collision Attack", CHES 2010, LNCS 6225, pp.125-139. Springer-Verlag, 2010.
  17. C. Clavier, B. Feix, G. Gagnerot, M. Roussellet, and V. Verneuil, "Improved Collision-Correlation Power Analysis on First Order Protected AES", CHES 2011, LNCS 6917, pp.49-62, Springer-Verlag, 2011.
  18. G. Welchman, "The Hut Six Story: Breaking the Enigma Codes", New York, McGraw-Hill, 1982.
  19. S. Mangard, E. Oswald, and T. Popp, "Power Analysis Attack: Revealing the Secrets of Smart Cards", Springer, 2007.
  20. J. Daemen and V. Rijmen, "AES Proposal: Rijndael." 1998.