Cryptanalysis of the m-permutation protection schemes

Anderson and Kuhn have proposed the EEPROM modification attack to recover the secret key stored in the EEPROM. At ACISP ’98, Fung and Gray proposed an m-permutation protection scheme against the EEPROM modification attack. At ACISP ’99, Fung and Gray pointed out that in their original scheme, a secr...

Full description

Saved in:
Bibliographic Details
Main Authors: WU, Hongjun, BAO, Feng, YE, Dingfeng, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2000
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1111
https://ink.library.smu.edu.sg/context/sis_research/article/2110/viewcontent/Wu2000_CryptanalysisOfTheMPerMutation_pv.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-2110
record_format dspace
spelling sg-smu-ink.sis_research-21102022-02-18T05:13:02Z Cryptanalysis of the m-permutation protection schemes WU, Hongjun BAO, Feng YE, Dingfeng DENG, Robert H. Anderson and Kuhn have proposed the EEPROM modification attack to recover the secret key stored in the EEPROM. At ACISP ’98, Fung and Gray proposed an m-permutation protection scheme against the EEPROM modification attack. At ACISP ’99, Fung and Gray pointed out that in their original scheme, a secret key with too small or too large Hamming weight could be recovered easily. Then they proposed a revised m- permutation protection scheme and claimed that their revised scheme does not leak any information of the secret key. In this paper, we break completely both the original and the revised m-permutation protection schemes. The original scheme is broken with about 2log2 n devices from the same batch and about (3log2 n +2 ) ×m ×n probes (n is the length of the secret key and m is the amount of permutations). The revised m-permutation protection scheme is more vulnerable than the original one. It could be broken with only one device and about m ×n 3/3 probes. 2000-07-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1111 info:doi/10.1007/10718964_9 https://ink.library.smu.edu.sg/context/sis_research/article/2110/viewcontent/Wu2000_CryptanalysisOfTheMPerMutation_pv.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Public key cryptography Data privacy Information protection Secrecy protection Security key Computer security Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Public key cryptography
Data privacy
Information protection
Secrecy protection
Security key
Computer security
Information Security
spellingShingle Public key cryptography
Data privacy
Information protection
Secrecy protection
Security key
Computer security
Information Security
WU, Hongjun
BAO, Feng
YE, Dingfeng
DENG, Robert H.
Cryptanalysis of the m-permutation protection schemes
description Anderson and Kuhn have proposed the EEPROM modification attack to recover the secret key stored in the EEPROM. At ACISP ’98, Fung and Gray proposed an m-permutation protection scheme against the EEPROM modification attack. At ACISP ’99, Fung and Gray pointed out that in their original scheme, a secret key with too small or too large Hamming weight could be recovered easily. Then they proposed a revised m- permutation protection scheme and claimed that their revised scheme does not leak any information of the secret key. In this paper, we break completely both the original and the revised m-permutation protection schemes. The original scheme is broken with about 2log2 n devices from the same batch and about (3log2 n +2 ) ×m ×n probes (n is the length of the secret key and m is the amount of permutations). The revised m-permutation protection scheme is more vulnerable than the original one. It could be broken with only one device and about m ×n 3/3 probes.
format text
author WU, Hongjun
BAO, Feng
YE, Dingfeng
DENG, Robert H.
author_facet WU, Hongjun
BAO, Feng
YE, Dingfeng
DENG, Robert H.
author_sort WU, Hongjun
title Cryptanalysis of the m-permutation protection schemes
title_short Cryptanalysis of the m-permutation protection schemes
title_full Cryptanalysis of the m-permutation protection schemes
title_fullStr Cryptanalysis of the m-permutation protection schemes
title_full_unstemmed Cryptanalysis of the m-permutation protection schemes
title_sort cryptanalysis of the m-permutation protection schemes
publisher Institutional Knowledge at Singapore Management University
publishDate 2000
url https://ink.library.smu.edu.sg/sis_research/1111
https://ink.library.smu.edu.sg/context/sis_research/article/2110/viewcontent/Wu2000_CryptanalysisOfTheMPerMutation_pv.pdf
_version_ 1770570859758485504