Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform
スポンサーリンク
概要
- 論文の詳細を見る
This paper shows two power analysis attacks against a software implementation of a first-order DPA resistant S-box algorithm that is based on the discrete Fourier Transform (DFT). The DPA resistant S-box algorithm based on DFT was proposed by Prouff et al. in 2006 and improved by Coron et al. in 2008, respectively. In our attacks against the improved one, we pre-process the power traces by separating them into two subgroups, so that each has a biased mask. For the separated power traces, two post analysis methods are proposed to identify the key. One is based on DPA attack against one subgroup, and the other utilizes the difference of means for two subgroups and a pattern matching. Finally, we compare these two attack methods and propose an algorithm-level countermeasure to enhance the security of S-box calculation based on the DFT.
- 2011-01-01
著者
-
OHTA Kazuo
University of Electro-Communications
-
Sakiyama Kazuo
Department Of Informatics The University Of Electro-communications
-
Kawamura Shinichi
Research Center For Information Security National Institute Of Advanced Industrial Science And Techn
-
Kawamura Shinichi
Research Center For Information Security Advanced Industrial Science And Technology
-
Li Yang
Department Of Informatics The University Of Electro-communications
-
Li Yang
Department Of Biochemistry Yong Loo Lin School Of Medicine National University Of Singapore
-
Ohta Kazuo
Department Of Informatics The University Of Electro-communications
関連論文
- Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC
- Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
- Toward the Fair Anonymous Signatures : Deniable Ring Signatures(Signatures,Cryptography and Information Security)
- Security of Cryptosystems Using Merkle-Damgård in the Random Oracle Model
- Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
- Cryptanalysis of Two MD5-Based Authentication Protocols : APOP and NMAC
- Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols
- Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
- A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
- New Message Differences for Collision Attacks on MD4 and MD5
- Improved Collision Attacks on MD4 and MD5(Hash Functions,Cryptography and Information Security)
- Universally composable client-to-client general authenticated key exchange (特集:情報システムを支えるコンピュータセキュリティ技術の再考)
- IS-81 Lipopolysaccharide Administration Worsen Hypoxic-ischemic Damage in Newborn Rats
- CD4^+ T cells are required for HSP65 expression in host macrophages and for protection of mice infected with Plasmodium yoelii
- On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL
- Universally Composable Hierarchical Hybrid Authenticated Key Exchange(Protocols,Cryptography and Information Security)
- Role of the miR-106b-25 microRNA cluster in hepatocellular carcinoma
- GABA_C-Receptor Stimulation Activates cAMP-Dependent Protein Kinase via A-Kinase Anchoring Protein 220
- Improved Collision Search for Hash Functions : New Advanced Message Modification
- Probabilistic Multi-Signature Schemes Using a One-Way Trapdoor Permutation(Discrete Mathematics and Its Applications)
- OAEP-ES : Methodology of Universal Padding Technique (Asymmetric Cipher) (Cryptography and Information Security)
- Solutions to Security Problems of Rivest and Shamir's Pay Word Scheme(Application)(Cryptography and Information Security)
- Provably Secure Multisignatures in Formal Security Model and Their Optimality
- Taxonomical Security Consideration of OAEP Variants(Discrete Mathematics and Its Applications)
- Preparation and Characterization of Lyotropic Liquid Crystalline Aromatic Copolyamides Containing Twisty and Non-coplanar Moiety
- BS-CPA : Built-In Determined Sub-Key Correlation Power Analysis
- Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform
- Near-Collision Attacks on MD4 : Applied to MD4-Based Protocols
- Maurer-Yacobi ID-Based Key Distribution Revisited(Discrete Mathematics and Its Applications)
- Low Temperature Copper to Copper Direct Bonding
- Security of Cryptosystems Using Merkle-Damgard in the Random Oracle Model
- Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares(Discrete Mathematics and Its Applications)
- Ring signatures: universally composable definitions and constructions (特集:情報システムを支えるコンピュータセキュリティ技術の再考)
- Frequency-Hopping Pilot Patterns for OFDM Cellular Systems(Sequence Design and its Application in Communications)
- Differential-Linear Cryptanalysis of FEAL-8 (Special Section on Cryptography and Information Security)
- Leaky Random Oracle
- FOREWORD
- Universally Composable NBAC-Based Fair Voucher Exchange for Mobile Environments
- How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model
- Reduction of cardiovascular response to endotracheal intubation in normotensive patients by urapidil
- NMR study of peplomycin in aqueous solution : Assignment of resonances by means of two-dimensional spectroscopy
- Possible structural role of the disaccharide unit in Fe-bleomycin before and after oxygen activation
- Prehypertension in Children and Adolescents: Association with Body Weight and Neck Circumference
- Isolation and Characterization of Bacterial Isolates Algicidal against a Harmful Bloom-forming Cyanobacterium Microcystis aeruginosa
- Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128
- Toward Effective Countermeasures against an Improved Fault Sensitivity Analysis
- Proxiable Designated Verifier Signature
- Isolation and Characterization of Bacterial Isolates Algicidal against a Harmful Bloom-forming Cyanobacterium Microcystis aeruginosa
- A New Type of Fault-Based Attack: Fault Behavior Analysis
- Precoding Scheme for Distributed Antenna Systems with Non-Kronecker Correlation over Spatially Correlated Channel