A finer-grain analysis of the leakage (non) resilience of OCB

OCB3 is one of the winners of the CAESAR competition and is among the most popular authenticated encryption schemes. In this paper, we put forward a fine-grain study of its security against side-channel attacks. We start from trivial key recoveries in settings where the mode can be attacked with sta...

Full description

Saved in:
Bibliographic Details
Main Authors: Berti, Francesco, Bhasin, Shivam, Breier, Jakub, Hou, Xiaolu, Poussier, Romain, Standaert, François-Xavier, Udvarhelyi, Balasz
Format: Article
Language:English
Published: 2023
Subjects:
OCB
Online Access:https://hdl.handle.net/10356/164223
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-164223
record_format dspace
spelling sg-ntu-dr.10356-1642232023-01-14T23:32:57Z A finer-grain analysis of the leakage (non) resilience of OCB Berti, Francesco Bhasin, Shivam Breier, Jakub Hou, Xiaolu Poussier, Romain Standaert, François-Xavier Udvarhelyi, Balasz Engineering::Computer science and engineering OCB Side-Channel Attacks OCB3 is one of the winners of the CAESAR competition and is among the most popular authenticated encryption schemes. In this paper, we put forward a fine-grain study of its security against side-channel attacks. We start from trivial key recoveries in settings where the mode can be attacked with standard Differential Power Analysis (DPA) against some block cipher calls in its execution (namely, initialization, processing of associated data or last incomplete block and decryption). These attacks imply that at least these parts must be strongly protected thanks to countermeasures like masking. We next show that if these block cipher calls of the mode are protected, practical attacks on the remaining block cipher calls remain possible. A first option is to mount a DPA with unknown inputs. A more efficient option is to mount a DPA that exploits horizontal relations between consecutive input whitening values. It allows trading a significantly reduced data complexity for a higher key guessing complexity and turns out to be the best attack vector in practical experiments performed against an implementation of OCB3 in an ARM Cortex-M0. Eventually, we consider an implementation where all the block cipher calls are protected. We first show that exploiting the leakage of the whitening values requires mounting a Simple Power Analysis (SPA) against linear operations. We then show that despite being more challenging than when applied to non-linear operations, such an SPA remains feasible against 8-bit implementations, leaving its generalization to larger implementations as an interesting open problem. We last describe how recovering the whitening values can lead to strong attacks against the confidentiality and integrity of OCB3. Thanks to this comprehensive analysis, we draw concrete requirements for side-channel resistant implementations of OCB3. National Research Foundation (NRF) Published version This work has been funded in parts by the ERC project 724725 (SWORD). The authors acknowledge partial support from the Singapore National Research Foundation (“SOCure” grant NRF2018NCR-NCR002-0001 –www.green-ic.org/socure). François-Xavier Standaertis a senior associate researcher of the Belgian Fund for Scientific Research. 2023-01-10T04:42:55Z 2023-01-10T04:42:55Z 2021 Journal Article Berti, F., Bhasin, S., Breier, J., Hou, X., Poussier, R., Standaert, F. & Udvarhelyi, B. (2021). A finer-grain analysis of the leakage (non) resilience of OCB. IACR Transactions On Cryptographic Hardware and Embedded Systems, 2022(1), 461-481. https://dx.doi.org/10.46586/tches.v2022.i1.461-481 2569-2925 https://hdl.handle.net/10356/164223 10.46586/tches.v2022.i1.461-481 2-s2.0-85127605835 1 2022 461 481 en NRF2018NCR-NCR002-0001 IACR Transactions on Cryptographic Hardware and Embedded Systems © 2021 Francesco Berti, Shivam Bhasin, Jakub Breier, Xiaolu Hou, Romain Poussier, François-Xavier Standaert, Balasz Udvarhelyi. Licensed under Creative Commons License CC-BY 4.0. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Computer science and engineering
OCB
Side-Channel Attacks
spellingShingle Engineering::Computer science and engineering
OCB
Side-Channel Attacks
Berti, Francesco
Bhasin, Shivam
Breier, Jakub
Hou, Xiaolu
Poussier, Romain
Standaert, François-Xavier
Udvarhelyi, Balasz
A finer-grain analysis of the leakage (non) resilience of OCB
description OCB3 is one of the winners of the CAESAR competition and is among the most popular authenticated encryption schemes. In this paper, we put forward a fine-grain study of its security against side-channel attacks. We start from trivial key recoveries in settings where the mode can be attacked with standard Differential Power Analysis (DPA) against some block cipher calls in its execution (namely, initialization, processing of associated data or last incomplete block and decryption). These attacks imply that at least these parts must be strongly protected thanks to countermeasures like masking. We next show that if these block cipher calls of the mode are protected, practical attacks on the remaining block cipher calls remain possible. A first option is to mount a DPA with unknown inputs. A more efficient option is to mount a DPA that exploits horizontal relations between consecutive input whitening values. It allows trading a significantly reduced data complexity for a higher key guessing complexity and turns out to be the best attack vector in practical experiments performed against an implementation of OCB3 in an ARM Cortex-M0. Eventually, we consider an implementation where all the block cipher calls are protected. We first show that exploiting the leakage of the whitening values requires mounting a Simple Power Analysis (SPA) against linear operations. We then show that despite being more challenging than when applied to non-linear operations, such an SPA remains feasible against 8-bit implementations, leaving its generalization to larger implementations as an interesting open problem. We last describe how recovering the whitening values can lead to strong attacks against the confidentiality and integrity of OCB3. Thanks to this comprehensive analysis, we draw concrete requirements for side-channel resistant implementations of OCB3.
format Article
author Berti, Francesco
Bhasin, Shivam
Breier, Jakub
Hou, Xiaolu
Poussier, Romain
Standaert, François-Xavier
Udvarhelyi, Balasz
author_facet Berti, Francesco
Bhasin, Shivam
Breier, Jakub
Hou, Xiaolu
Poussier, Romain
Standaert, François-Xavier
Udvarhelyi, Balasz
author_sort Berti, Francesco
title A finer-grain analysis of the leakage (non) resilience of OCB
title_short A finer-grain analysis of the leakage (non) resilience of OCB
title_full A finer-grain analysis of the leakage (non) resilience of OCB
title_fullStr A finer-grain analysis of the leakage (non) resilience of OCB
title_full_unstemmed A finer-grain analysis of the leakage (non) resilience of OCB
title_sort finer-grain analysis of the leakage (non) resilience of ocb
publishDate 2023
url https://hdl.handle.net/10356/164223
_version_ 1756370592873840640