dc.contributor.authorBreier, Jakub
dc.contributor.authorJap, Dirmanto
dc.contributor.authorBhasin, Shivam
dc.date.accessioned2018-05-03T08:27:20Z
dc.date.available2018-05-03T08:27:20Z
dc.date.copyright2018-04-01
dc.date.issued2018
dc.identifier.citationBreier, J., Jap, D., & Bhasin, S. (2018). SCADPA: Side-channel assisted differential-plaintext attack on bit permutation based ciphers. 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1129-1134.en_US
dc.identifier.urihttp://hdl.handle.net/10220/44744
dc.description.abstractBit permutations are a common choice for diffusion function in lightweight block ciphers, owing to their low implementation footprint. In this paper, we present a novel Side-Channel Assisted Differential-Plaintext Attack (SCADPA), exploiting specific vulnerabilities of bit permutations. SCADPA is a chosen-plaintext attack, knowledge of the ciphertext is not required. Unlike statistical methods, commonly used for distinguisher in standard power analysis, the proposed method is more differential in nature. The attack shows that diffusion layer can play a significant role in distinguishing the internal cipher state. We demonstrate how to practically exploit such vulnerability to extract the secret key. Results on microcontroller-based PRESENT-80 cipher lead to full key retrieval using as low as 17 encryptions. It is possible to automate the attack by using a thresholding method detailed in the paper. Several case studies are presented, using various attacker models and targeting different encryption modes (such as CTR and CBC). We provide a discussion on how to avoid such attack from the design point of view.en_US
dc.format.extent6 p.en_US
dc.language.isoenen_US
dc.relation.ispartofseries
dc.rights© 2018 European Design and Automation Association (EDAA). This paper was published in 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE) and is made available as an electronic reprint (preprint) with permission of EDAA. The published version is available at: [http://dx.doi.org/10.23919/DATE.2018.8342180]. One print or electronic copy may be made for personal use only. Systematic or multiple reproduction, distribution to multiple locations via electronic or other means, duplication of any material in this paper for a fee or for commercial purposes, or modification of the content of the paper is prohibited and is subject to penalties under law.en_US
dc.subjectBit Permutationsen_US
dc.subjectCiphersen_US
dc.titleSCADPA: Side-channel assisted differential-plaintext attack on bit permutation based ciphersen_US
dc.typeConference Paper
dc.contributor.conference2018 Design, Automation & Test in Europe Conference & Exhibition (DATE)en_US
dc.contributor.researchTemasek Laboratoriesen_US
dc.identifier.doihttp://dx.doi.org/10.23919/DATE.2018.8342180
dc.description.versionPublished versionen_US
dc.identifier.rims206798


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record