Browse > Article
http://dx.doi.org/10.13089/JKIISC.2022.32.4.607

SITM Attacks on GIFT-128: Application to NIST Lightweight Cryptography Finalist GIFT-COFB  

Park, Jonghyun (Kookmin University)
Kim, Hangi (Kookmin University)
Kim, Jongsung (Kookmin University)
Abstract
The SITM (See-In-The-Middle) proposed in CHES 2020 is a methodology for side-channel assisted differential cryptanalysis. This technique analyzes the power traces of unmasked middle rounds in partial masked SPN block cipher implementation, and performs differential analysis with the side channel information. Blockcipher GIFT is a lightweight blockcipher proposed in CHES 2017, designed to correct the well-known weaknesses of block cipher PRESENT and provide the efficient implementation. In this paper, we propose SITM attacks on partial masked implementation of GIFT-128. This attack targets 4-round and 6-round masked implementation of GIFT-128 and time/data complexity is 214.01 /214.01, 216 /216. In this paper, we compare the masterkey recovery logic available in SITM attacks, establishing a criterion for selecting more efficient logic depending on the situation. Finally, We introduce how to apply the this attack to GIFT-COFB, one of the finalist candidates in NIST lightweight cryptography standardization process.
Keywords
Differential Cryptanalysis; Side-Channel Analysis; SITM; GIFT; GIFT-COFB;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Banik, S. K. Pandey, T. Peyrin, Y. Sasaki, S. M. Sim and Y. Todo, "GIFT: a small present," International Conference on Cryptographic Hardware and Embedded Systems, LNCS 10529, pp. 321-345, Sep. 2017.
2 W. Unger, L. Babinkostova, M. Borowczak, and R. Erbes, "Side-channel Leakage Assessment Metrics: A Case Study of GIFT Block Ciphers," IEEE Computer Society Annual Symposium on VLSI, IEEE, pp. 236-241, Jul. 2021.
3 R, Zong, X. Dong, H. Chen, Y. Luo, S. Wang, and Z. Li, "Towards Key- recovery-attack friendly distinguishers: Application to GIFT-128," IACR Trans- actions on Symmetric Cryptology, vol. 2021, no. 1, pp. 156-184, Mar. 2021.
4 HyENA, https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/spec-doc-rnd2/hyena-spec-round2.pdf
5 GIFT-COFB, https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/gift-cofb-spec-final.pdf
6 E. Biham, and A. Shamir, "Differential cryptanalysis of DES-like cryptosystems," Journal of CRYPTOLOGY, vol. 4, no. 1, pp. 3-72, Jan. 1991.   DOI
7 P. Kocher, J. Jaffe and B. Jun, "Differential power analysis," In: Annual international cryptology conference, LNCS 1666, pp. 388-397, Dec. 1999.
8 S. Nikova, C. Rechberger, and V. Rijmen, "Threshold Implementations Against Side-Channel Attacks and Glitches," International conference on information and communications security, LNCS 4307, no. 1, pp. 529-545, Dec. 2006.
9 J. Breier, D. Jap, and S. Bhasin, "SCADPA: Side-channel assisted differential-plaintext attack on bit permutation based ciphers," 2018 Design, Automation & Test in Europe Conference & Exhibition, IEEE, pp. 1129-1134, Mar. 2018.
10 S. Bhasin, J. Breier, X. Hou, D. Jap, R. Poussier and S. M. Sim, "Sitm: See-in-the-middle side-channel assisted middle round differential cryptanalysis on spn block ciphers," IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2020, no. 1, pp. 95-122, Nov. 2019.
11 A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. Robshaw, et al., "Present: An ultra-lightweight block cipher," International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 4727, pp. 450-466, Sep. 2007
12 C. Blondeau and K. Nyberg, "Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities," In: EUROCRYPT 2014, LNCS 8441, pp. 165-182, May 2014.
13 C. Jooyeon, "Linear cryptanalysis of reduced-round PRESENT," In: CT-RSA 2010, LNCS, vol. 5985, pp. 302-317, 2010.
14 SUNDAE-GIFT, https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/spec-doc-rnd2/SUNDAE-GIFT-spec-round2.pdf
15 J.H Park, H.G Kim, and J.S Kim, "Improved SITM Attack on the PRESENT Blockcipher," Journal of the Korea Institute of Information Security & Cryptology, 32(2), pp. 155-162, Apr. 2022.
16 NIST Lightweight Cryptography Standar dization: Finalists Announced, https://csrc.nist.gov/News/2021/lightweight-crypto-finalists-announced
17 A. Adomnicai, Z. Najm, T. Peyrin, "Fixslicing: a new GIFT representation: fast constant-time implementations of GIFT and GIFT-COFB on ARM Cortex-M," IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2020. no. 3, pp. 402-27, Jun, 2020.