Key-dependent side-channel cube attack on CRAFT

CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side-channel cube attacks. We apply side-channel cube attacks to CRAFT with the Hamming weight leakage assumption. We...

Full description

Saved in:
Bibliographic Details
Main Authors: Pang, Kok-An, Abdul Latip, Shekh Faisal
Format: Article
Language:English
Published: John Wiley and Sons Inc 2021
Online Access:http://eprints.utem.edu.my/id/eprint/26130/2/KEY-DEPENDENT%20SIDE-CHANNEL%20CUBE%20ATTACK%20ON%20CRAFT.PDF
http://eprints.utem.edu.my/id/eprint/26130/
https://onlinelibrary.wiley.com/doi/epdf/10.4218/etrij.2019-0539
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknikal Malaysia Melaka
Language: English
id my.utem.eprints.26130
record_format eprints
spelling my.utem.eprints.261302023-03-06T09:17:36Z http://eprints.utem.edu.my/id/eprint/26130/ Key-dependent side-channel cube attack on CRAFT Pang, Kok-An Abdul Latip, Shekh Faisal CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side-channel cube attacks. We apply side-channel cube attacks to CRAFT with the Hamming weight leakage assumption. We found that the first half of the secret key can be recovered from the Hamming weight leakage after the first round. Next, using the recovered key bits, we continue our attack to recover the second half of the secret key. We show that the set of equations that are solvable varies depending on the value of the key bits. Our result shows that 99.90% of the key space can be fully recovered within a practical time. John Wiley and Sons Inc 2021-03 Article PeerReviewed text en http://eprints.utem.edu.my/id/eprint/26130/2/KEY-DEPENDENT%20SIDE-CHANNEL%20CUBE%20ATTACK%20ON%20CRAFT.PDF Pang, Kok-An and Abdul Latip, Shekh Faisal (2021) Key-dependent side-channel cube attack on CRAFT. ETRI Journal, 43 (2). pp. 344-356. ISSN 2233-7326 https://onlinelibrary.wiley.com/doi/epdf/10.4218/etrij.2019-0539 10.4218/etrij.2019-0539
institution Universiti Teknikal Malaysia Melaka
building UTEM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknikal Malaysia Melaka
content_source UTEM Institutional Repository
url_provider http://eprints.utem.edu.my/
language English
description CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side-channel cube attacks. We apply side-channel cube attacks to CRAFT with the Hamming weight leakage assumption. We found that the first half of the secret key can be recovered from the Hamming weight leakage after the first round. Next, using the recovered key bits, we continue our attack to recover the second half of the secret key. We show that the set of equations that are solvable varies depending on the value of the key bits. Our result shows that 99.90% of the key space can be fully recovered within a practical time.
format Article
author Pang, Kok-An
Abdul Latip, Shekh Faisal
spellingShingle Pang, Kok-An
Abdul Latip, Shekh Faisal
Key-dependent side-channel cube attack on CRAFT
author_facet Pang, Kok-An
Abdul Latip, Shekh Faisal
author_sort Pang, Kok-An
title Key-dependent side-channel cube attack on CRAFT
title_short Key-dependent side-channel cube attack on CRAFT
title_full Key-dependent side-channel cube attack on CRAFT
title_fullStr Key-dependent side-channel cube attack on CRAFT
title_full_unstemmed Key-dependent side-channel cube attack on CRAFT
title_sort key-dependent side-channel cube attack on craft
publisher John Wiley and Sons Inc
publishDate 2021
url http://eprints.utem.edu.my/id/eprint/26130/2/KEY-DEPENDENT%20SIDE-CHANNEL%20CUBE%20ATTACK%20ON%20CRAFT.PDF
http://eprints.utem.edu.my/id/eprint/26130/
https://onlinelibrary.wiley.com/doi/epdf/10.4218/etrij.2019-0539
_version_ 1759693052484517888