Browse > Article

New Power Analysis Attack on The Masking Type Conversion Algorithm  

Cho, Young-In (Graduate School of Information Management and Security, Korea University)
Kim, Hee-Seok (Graduate School of Information Management and Security, Korea University)
Han, Dong-Guk (Department of Mathematics, Kookmin University)
Hong, Seok-Hie (Graduate School of Information Management and Security, Korea University)
Kang, Ju-Sung (Department of Mathematics, Kookmin University)
Publication Information
Abstract
In the recent years, power analysis attacks were widely investigated, and so various countermeasures have been proposed. In the case of block ciphers, masking methods that blind the intermediate results in the algorithm computations(encryption, decryption, and key-schedule) are well-known. The type conversion of masking is unavoidable since Boolean operation and Arithmetic operation are performed together in block cipher. Messerges proposed a masking type conversion algorithm resistant general power analysis attack and then it's vulnerability was reported. We present that some of exiting attacks have some practical problems and propose a new power analysis attack on Messerges's algorithm. After we propose the strengthen DPA and CPA attack on the masking type conversion algorithm, we show that our proposed attack is a practical threat as the simulation results.
Keywords
Side Channel Attack Countermeasure; Masking; Power Analysis Attack; DPA; CPA;
Citations & Related Records
연도 인용수 순위
  • Reference
1 E. Oswald, S. Mangard, N. Pramstaller, and V. Rijmen., "A Side-Channel Analysis Resistant Description of the AES S-box," FSE 2005, LNCS 3557, pp. 413–423, Springer, 2005.
2 P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," CRYPTO'9, pp.388-397, Springer -Verlag, 1999.
3 P. Kocher, J. Jaffe, and B. Jun, "Introduction to differential power analysis and related attacks," http://www.cryptography.com/dpa/technical, 1998.
4 P. Kocher, J. Jaffe, and B. Jun, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Others Systems." CRYPTO'6, LNCS 1109, pp.104-113, Springer-Verlag, 1996.
5 T. S. Messerges, E. A. Dabbish, and R. H. Sloan, "Power analysis attacks on modular exponentiation in Smart cards," Proc. of Workshop on Cryptographic Hardware and Embedded Systems, pp.144-157, Springer-Verlag, 1999.
6 E. Oswald and K. Schramm. "An Efficient Masking Scheme for AES Software Implementations," TM WISA 2005, LNCS 3786, pp. 292–305, Springer, 2006.
7 T. Messerges, "Securing the AES Finalists Against Power Analysis Attacks," Proc. Seventh Int'l Workshop Fast Software Encryption (FSE 2000), pp. 150-164, 2001.
8 J.S. Coron, L. Goubin, "On Boolean and Arithmetic Masking against Differential Power Analysis," Proc. of CHES'00, pp. 231-237, 2000.
9 J. Bl"omer, J. Guajardo, and V. Krummel. "Provably Secure Masking of AES," SAC 2004, LNCS 3357, pp. 69-83, Springer, 2005.