Key schedule against template attack-based simple power analysis on a single target

Since 2002, there have been active discussions on template attacks due to the robust performance of such attacks. There are reports of numerous proposals to improve the accuracy of prediction model in order to identify the point of interest. To date, many researchers have only focused on the perform...

Full description

Saved in:
Bibliographic Details
Main Authors: Won, Yoo-Seung, Sim, Bo-Yeon, Park, Jong-Yeon
Other Authors: PACE Temasek Laboratories
Format: Article
Language:English
Published: 2021
Subjects:
Online Access:https://hdl.handle.net/10356/146189
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-146189
record_format dspace
spelling sg-ntu-dr.10356-1461892021-01-30T20:11:48Z Key schedule against template attack-based simple power analysis on a single target Won, Yoo-Seung Sim, Bo-Yeon Park, Jong-Yeon PACE Temasek Laboratories Engineering::Electrical and electronic engineering Template Attack AES Key Schedule Since 2002, there have been active discussions on template attacks due to the robust performance of such attacks. There are reports of numerous proposals to improve the accuracy of prediction model in order to identify the point of interest. To date, many researchers have only focused on the performance of template attacks. In this paper, we introduce a new approach to retrieve the secret information in key schedules, without the profiling phase utilizing secret information. The template attack allows us to reveal the correct key even though the encryption/decryption processes have powerful countermeasures. More precisely, if the templates are sufficiently built in loading/saving the public information, in the extraction phase, the templates already created can be applied to the identical operation about secret information, which allows us to retrieve the secret information even if the countermeasures are theoretically robust. This suggestion becomes another backdoor to avoid hardened countermeasures. In order to demonstrate our proposal, we consider the Advanced Encryption Standard key schedule as a target for attack; however, it cannot be the target of non-profiling attacks in general. Finally, the Hamming weight information of the correct key could be recovered in an XMEGA128 chip, without the secret information. Moreover, we concentrate on the potential possibility of our suggestion since the performance cannot outperform the original methods used in such attacks. Published version 2021-01-29T07:12:56Z 2021-01-29T07:12:56Z 2020 Journal Article Won, Y.-S., Sim, B.-Y., & Park, J.-Y. (2020). Key schedule against template attack-based simple power analysis on a single target. Applied Sciences, 10(11), 3804-. doi:10.3390/app10113804 2076-3417 0000-0002-5205-7530 0000-0002-6446-1020 0000-0002-1892-1698 https://hdl.handle.net/10356/146189 10.3390/app10113804 2-s2.0-85086118966 11 10 en Applied Sciences © 2020 The Author(s). Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Electrical and electronic engineering
Template Attack
AES Key Schedule
spellingShingle Engineering::Electrical and electronic engineering
Template Attack
AES Key Schedule
Won, Yoo-Seung
Sim, Bo-Yeon
Park, Jong-Yeon
Key schedule against template attack-based simple power analysis on a single target
description Since 2002, there have been active discussions on template attacks due to the robust performance of such attacks. There are reports of numerous proposals to improve the accuracy of prediction model in order to identify the point of interest. To date, many researchers have only focused on the performance of template attacks. In this paper, we introduce a new approach to retrieve the secret information in key schedules, without the profiling phase utilizing secret information. The template attack allows us to reveal the correct key even though the encryption/decryption processes have powerful countermeasures. More precisely, if the templates are sufficiently built in loading/saving the public information, in the extraction phase, the templates already created can be applied to the identical operation about secret information, which allows us to retrieve the secret information even if the countermeasures are theoretically robust. This suggestion becomes another backdoor to avoid hardened countermeasures. In order to demonstrate our proposal, we consider the Advanced Encryption Standard key schedule as a target for attack; however, it cannot be the target of non-profiling attacks in general. Finally, the Hamming weight information of the correct key could be recovered in an XMEGA128 chip, without the secret information. Moreover, we concentrate on the potential possibility of our suggestion since the performance cannot outperform the original methods used in such attacks.
author2 PACE Temasek Laboratories
author_facet PACE Temasek Laboratories
Won, Yoo-Seung
Sim, Bo-Yeon
Park, Jong-Yeon
format Article
author Won, Yoo-Seung
Sim, Bo-Yeon
Park, Jong-Yeon
author_sort Won, Yoo-Seung
title Key schedule against template attack-based simple power analysis on a single target
title_short Key schedule against template attack-based simple power analysis on a single target
title_full Key schedule against template attack-based simple power analysis on a single target
title_fullStr Key schedule against template attack-based simple power analysis on a single target
title_full_unstemmed Key schedule against template attack-based simple power analysis on a single target
title_sort key schedule against template attack-based simple power analysis on a single target
publishDate 2021
url https://hdl.handle.net/10356/146189
_version_ 1690658319592587264