Side channel attack on stream ciphers: a three-step approach to state/key recovery
Side Channel Attack (SCA) exploits the physical information leakage (such as electromagnetic emanation) from a device that performs some cryptographic operation and poses a serious threat in the present IoT era. In the last couple of decades, there have been a large body of research works dedicated...
Saved in:
Main Authors: | , , , , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2023
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/164222 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-164222 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1642222023-01-14T23:32:56Z Side channel attack on stream ciphers: a three-step approach to state/key recovery Kumar, Satyam Dasu, Vishnu Asutosh Baksi, Anubhab Sarkar, Santanu Jap, Dirmanto Breier, Jakub Bhasin, Shivam School of Computer Science and Engineering Temasek Laboratories @ NTU Engineering::Computer science and engineering Stream Cipher Side Channel Attack Side Channel Attack (SCA) exploits the physical information leakage (such as electromagnetic emanation) from a device that performs some cryptographic operation and poses a serious threat in the present IoT era. In the last couple of decades, there have been a large body of research works dedicated to streamlining/improving the attacks or suggesting novel countermeasures to thwart those attacks. However, a closer inspection reveals that a vast majority of published works in the context of symmetric key cryptography is dedicated to block ciphers (or similar designs). This leaves the problem for the stream ciphers wide open. There are few works here and there, but a generic and systematic framework appears to be missing from the literature. Motivating by this observation, we explore the problem of SCA on stream ciphers with extensive details. Loosely speaking, our work picks up from the recent TCHES’21 paper by Sim, Bhasin and Jap. We present a framework by extending the efficiency of their analysis, bringing it into more practical terms. In a nutshell, we develop an automated framework that works as a generic tool to perform SCA on any stream cipher or a similar structure. It combines multiple automated tools (such as, machine learning, mixed integer linear programming, satisfiability modulo theory) under one umbrella, and acts as an end-to-end solution (taking side channel traces and returning the secret key). Our framework efficiently handles noisy data and works even after the cipher reaches its pseudo-random state. We demonstrate its efficacy by taking electromagnetic traces from a 32-bit software platform and performing SCA on a high-profile stream cipher, TRIVIUM, which is also an ISO standard. We show pragmatic key recovery on TRIVIUM during its initialization and also after the cipher reaches its pseudo-random state (i.e., producing key-stream). Published version 2023-01-10T04:28:44Z 2023-01-10T04:28:44Z 2022 Journal Article Kumar, S., Dasu, V. A., Baksi, A., Sarkar, S., Jap, D., Breier, J. & Bhasin, S. (2022). Side channel attack on stream ciphers: a three-step approach to state/key recovery. IACR Transactions On Cryptographic Hardware and Embedded Systems, 2022(2), 166-191. https://dx.doi.org/10.46586/tches.v2022.i2.166-191 2569-2925 https://hdl.handle.net/10356/164222 10.46586/tches.v2022.i2.166-191 2-s2.0-85127553660 2 2022 166 191 en IACR Transactions on Cryptographic Hardware and Embedded Systems © 2022 Satyam Kumar, Vishnu Asutosh Dasu, Anubhab Baksi, Santanu Sarkar, Dirmanto Jap, Jakub Breier, Shivam Bhasin. Licensed under Creative Commons License CC-BY 4.0. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Computer science and engineering Stream Cipher Side Channel Attack |
spellingShingle |
Engineering::Computer science and engineering Stream Cipher Side Channel Attack Kumar, Satyam Dasu, Vishnu Asutosh Baksi, Anubhab Sarkar, Santanu Jap, Dirmanto Breier, Jakub Bhasin, Shivam Side channel attack on stream ciphers: a three-step approach to state/key recovery |
description |
Side Channel Attack (SCA) exploits the physical information leakage (such as electromagnetic emanation) from a device that performs some cryptographic operation and poses a serious threat in the present IoT era. In the last couple of decades, there have been a large body of research works dedicated to streamlining/improving the attacks or suggesting novel countermeasures to thwart those attacks. However, a closer inspection reveals that a vast majority of published works in the context of symmetric key cryptography is dedicated to block ciphers (or similar designs). This leaves the problem for the stream ciphers wide open. There are few works here and there, but a generic and systematic framework appears to be missing from the literature. Motivating by this observation, we explore the problem of SCA on stream ciphers with extensive details. Loosely speaking, our work picks up from the recent TCHES’21 paper by Sim, Bhasin and Jap. We present a framework by extending the efficiency of their analysis, bringing it into more practical terms. In a nutshell, we develop an automated framework that works as a generic tool to perform SCA on any stream cipher or a similar structure. It combines multiple automated tools (such as, machine learning, mixed integer linear programming, satisfiability modulo theory) under one umbrella, and acts as an end-to-end solution (taking side channel traces and returning the secret key). Our framework efficiently handles noisy data and works even after the cipher reaches its pseudo-random state. We demonstrate its efficacy by taking electromagnetic traces from a 32-bit software platform and performing SCA on a high-profile stream cipher, TRIVIUM, which is also an ISO standard. We show pragmatic key recovery on TRIVIUM during its initialization and also after the cipher reaches its pseudo-random state (i.e., producing key-stream). |
author2 |
School of Computer Science and Engineering |
author_facet |
School of Computer Science and Engineering Kumar, Satyam Dasu, Vishnu Asutosh Baksi, Anubhab Sarkar, Santanu Jap, Dirmanto Breier, Jakub Bhasin, Shivam |
format |
Article |
author |
Kumar, Satyam Dasu, Vishnu Asutosh Baksi, Anubhab Sarkar, Santanu Jap, Dirmanto Breier, Jakub Bhasin, Shivam |
author_sort |
Kumar, Satyam |
title |
Side channel attack on stream ciphers: a three-step approach to state/key recovery |
title_short |
Side channel attack on stream ciphers: a three-step approach to state/key recovery |
title_full |
Side channel attack on stream ciphers: a three-step approach to state/key recovery |
title_fullStr |
Side channel attack on stream ciphers: a three-step approach to state/key recovery |
title_full_unstemmed |
Side channel attack on stream ciphers: a three-step approach to state/key recovery |
title_sort |
side channel attack on stream ciphers: a three-step approach to state/key recovery |
publishDate |
2023 |
url |
https://hdl.handle.net/10356/164222 |
_version_ |
1756370576734158848 |