Access-Driven Cache Attack on the Stream Cipher DICING Using the Chosen IV
スポンサーリンク
概要
- 論文の詳細を見る
A cache attack against DICING is presented. Cache attacks use CPU cache miss and hit information as side-channel information. DICING is a stream cipher that was proposed at eSTREAM. No effective attack on DICING has been reported before. Because DICING uses a key-dependent S-box and there is no key addition before the first S-box layer, a conventional cache attack is considered to be difficult. We therefore investigated an access-driven cache attack that employs the special features of transformation L to give the chosen IV. We also investigated reduction of the computational complexity required to obtain the secret key from the information gained in the cache attack. We were able to obtain a 40-bit key differential given a total of 218 chosen IVs on a Pentium III processor. From the obtained key differential, the 128-bit secret key could be recovered with computational complexity of from 249 to 263. This result shows that the new cache attack, which is based on a different attack model, is also applicable in an actual environment.
- (社)電子情報通信学会の論文
- 2010-04-01
著者
-
TSUNOO Yukiyasu
NEC Corporation
-
SAITO Teruo
NEC Software Hokuriku, Ltd.
-
KAWABATA Takeshi
NEC Software Hokuriku, Ltd.
-
SUZAKI Tomoyasu
NEC Corporation
-
KUBO Hiroyasu
NEC Software Hokuriku, Ltd.
-
Saito Teruo
Nec Software Hokuriku Ltd.
-
Kubo Hiroyasu
Nec Software Hokuriku Ltd.
-
Kawabata Takeshi
Nec Software Hokuriku Ltd.
関連論文
- Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks
- Access-Driven Cache Attack on the Stream Cipher DICING Using the Chosen IV
- A low-cost LSI design of AES against DPA attack by hiding power information (第21回 回路とシステム軽井沢ワークショップ論文集) -- (実現技術)
- An Unequal Secure Encryption Scheme for H.264/AVC Video Compression Standard
- Access-Driven Cache Attack on the Stream Cipher DICING Using the Chosen IV
- Results of Linear Cryptanalysis Using Linear Sieve Methods
- Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks
- Higher Order Differential Attack on 6-Round MISTY1
- Finding Higher Order Differentials of MISTY1
- Finding Higher Order Differentials of MISTY1