当前位置: X-MOL 学术ETRI J. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Key‐dependent side‐channel cube attack on CRAFT
ETRI Journal ( IF 1.3 ) Pub Date : 2021-03-17 , DOI: 10.4218/etrij.2019-0539
Kok‐An Pang 1 , Shekh Faisal Abdul‐Latip 1
Affiliation  

CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side‐channel cube attacks. We apply side‐channel cube attacks to CRAFT with the Hamming weight leakage assumption. We found that the first half of the secret key can be recovered from the Hamming weight leakage after the first round. Next, using the recovered key bits, we continue our attack to recover the second half of the secret key. We show that the set of equations that are solvable varies depending on the value of the key bits. Our result shows that 99.90% of the key space can be fully recovered within a practical time.

中文翻译:

CRAFT上与密钥相关的侧通道多维数据集攻击

CRAFT是一种可调整的分组密码,于2019年推出,旨在为差分故障分析提供强大的保护。在本文中,我们证明了CRAFT容易受到侧通道多维数据集攻击。我们使用汉明重量泄漏假设对CRAFT进行侧通道立方体攻击。我们发现,第一轮之后,可以从汉明重量泄漏中恢复秘密密钥的前半部分。接下来,使用恢复的密钥位,我们继续进行攻击以恢复秘密密钥的后半部分。我们表明,可解的方程组根据密钥位的值而变化。我们的结果表明,在实际时间内可以完全恢复99.90%的密钥空间。
更新日期:2021-04-16
down
wechat
bug