Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/137805
Title: On side channel vulnerabilities of bit permutations in cryptographic algorithms
Authors: Breier, Jakub
Jap, Dirmanto
Hou, Xiaolu
Bhasin, Shivam
Keywords: Engineering::Computer science and engineering::Data::Data encryption
Issue Date: 2019
Source: Breier, J., Jap, D., Hou, X., & Bhasin, S. (2019). On side channel vulnerabilities of bit permutations in cryptographic algorithms. IEEE Transactions on Information Forensics and Security, 15, 1072-1085. doi:10.1109/TIFS.2019.2932230
Journal: IEEE Transactions on Information Forensics and Security
Abstract: Lightweight block ciphers rely on simple operations to allow compact implementation. Thanks to its efficiency, bit permutation has emerged as an optimal choice for state-wise diffusion. It can be implemented by simple wiring in hardware or shifts in software. However, efficiency and security often go against each other. In this paper, we show how bit permutations introduce a side-channel vulnerability that can be exploited to extract the secret key from the cipher. Such vulnerabilities are specific to bit permutations and do not occur in other state-wise diffusion alternatives. We propose side-channel assisted differential-plaintext attack (SCADPA) which targets this vulnerability in the bit permutation operation. SCADPA is first experimentally demonstrated on PRESENT-80 on an 8-bit microcontroller, with the best case key recovery in 17 encryptions. In Addition, we adjust SCADPA to state-of-the-art bit sliced implementation from CHES'17 with experimental evaluation on a 32-bit microcontroller. The attack is then extended to latest bit-permutation-based cipher GIFT, allowing full key recovery in 36 encryptions. Application for reverse engineering of secret S-boxes in PRESENT-like proprietary ciphers is also shown.
URI: https://hdl.handle.net/10356/137805
ISSN: 1556-6013
DOI: 10.1109/TIFS.2019.2932230
Schools: School of Computer Science and Engineering 
Organisations: Physical Analysis and Cryptographic Engineering Laboratory
Research Centres: Temasek Laboratories 
Rights: © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/TIFS.2019.2932230
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:SCSE Journal Articles

Files in This Item:
File Description SizeFormat 
main.pdf1.61 MBAdobe PDFThumbnail
View/Open

SCOPUSTM   
Citations 20

12
Updated on Mar 9, 2025

Web of ScienceTM
Citations 20

7
Updated on Oct 24, 2023

Page view(s)

319
Updated on Mar 15, 2025

Download(s) 20

234
Updated on Mar 15, 2025

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.