Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption
Thomas Unterluggauer, Mario Werner, and Stefan Mangard, IAIK, Graz University of Technology
- 30. March 2017
Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient - - PowerPoint PPT Presentation
Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption Thomas Unterluggauer, Mario Werner, and Stefan Mangard, IAIK, Graz University of Technology 30. March 2017 Content Differential power analysis for key recovery Re-keying
Thomas Unterluggauer, Graz University of Technology
2
Thomas Unterluggauer, Graz University of Technology
3
i
Thomas Unterluggauer, Graz University of Technology
4
Thomas Unterluggauer, Graz University of Technology
5
Thomas Unterluggauer, Graz University of Technology
6
Thomas Unterluggauer, Graz University of Technology
7
Thomas Unterluggauer, Graz University of Technology
8
Thomas Unterluggauer, Graz University of Technology
9
0, k ′′
Thomas Unterluggauer, Graz University of Technology
10
Thomas Unterluggauer, Graz University of Technology
11
Thomas Unterluggauer, Graz University of Technology
12
10,000 20,000 30,000 40,000 0.05 0.1 0.15
Thomas Unterluggauer, Graz University of Technology
13
Thomas Unterluggauer, Graz University of Technology
14
0, k ′′
Thomas Unterluggauer, Graz University of Technology
15
Thomas Unterluggauer, Graz University of Technology
16
Thomas Unterluggauer, Graz University of Technology
17
500 1,000 1,500 2,000 2,500 3,000 1 2 3 ·10−4
Sample Variance S-box Key
Thomas Unterluggauer, Graz University of Technology
18
1,000 2,000 3,000 4,000 5,000 0.2 0.4 0.6 0.8 1
Number of Traces Probability Thomas Unterluggauer, Graz University of Technology
19
Thomas Unterluggauer, Graz University of Technology
20
Thomas Unterluggauer, Graz University of Technology
21
Thomas Unterluggauer, Graz University of Technology
22
[HTM09] Neil Hanley, Michael Tunstall, and William P . Marnane. Unknown plaintext template attacks. In WISA 2009, pages 148–162, 2009. [SPY+10] Franc ¸ois-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, and Elisabeth Oswald. Leakage resilient cryptography in practice. In Towards Hardware-Intrinsic Security – Foundations and Practice, pages 99–134. 2010. [TS15] Mostafa M. I. Taha and Patrick Schaumont. Key updating for leakage resiliency with application to AES modes of operation. IEEE Trans. Information Forensics and Security, 10(3):519–528, 2015. Thomas Unterluggauer, Graz University of Technology
24