On the Leakage between Arithmetic Components of DES Algorithm
- DOI
- 10.2991/csic-15.2015.14How to use a DOI?
- Keywords
- Data Encryption Standard(DES), Differential Power Analysis (DPA), Side Channel Attack (SCA), Leakage between components, Masking Smartcards
- Abstract
Security of cryptographic embedded devices has become a prevalent concern, especially since the introduction of Differential Power Analysis (DPA) by Paul Kocher et al. In the past years, many efforts have been made to improve the resistance against Side Channel Attack (SCA) of cryptographic devices. Among the countermeasures, masking is a typical and efficient strategy. However, a number of effective attacks on masked cryptographic devices have been developed in recent years, and this paper continues this line of research. On theory, a DES with a masking scheme is secure under first order SCA, but we dig out a new leakage problem which makes it possible to attack a masked DES without using higher-order power analysis. Concretely, we perform a first-order correlation power analysis based on the leakage relationship between two different arithmetic components of DES.And the reason for this leakage is analyzed and verified by us through simulation and real card attacks.
- Copyright
- © 2015, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Yijie Ge AU - Zheng Guo AU - Zhigang Mao AU - Junrong Liu AU - Jiachao Chen PY - 2015/07 DA - 2015/07 TI - On the Leakage between Arithmetic Components of DES Algorithm BT - Proceedings of the 2015 International Conference on Computer Science and Intelligent Communication PB - Atlantis Press SP - 56 EP - 61 SN - 2352-538X UR - https://doi.org/10.2991/csic-15.2015.14 DO - 10.2991/csic-15.2015.14 ID - Ge2015/07 ER -