TY - GEN
T1 - Chosen-input side-channel analysis on unrolled light-weight cryptographic hardware
AU - Yli-Mäyry, Ville
AU - Homma, Naofumi
AU - Aoki, Takafumi
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/5/2
Y1 - 2017/5/2
N2 - Lightweight ciphers designed with a fully unrolled architecture, capable of encryption/decryption in a single clock cycle, have gained momentum in the last few years. They've shown that very low latency encryption/decryption is possible with modest costs in comparison with traditional round-based designs. This paper explores how to most efficiently perform side-channel analysis against such unrolled cryptographic hardware in a setting where the adversary may freely choose the plaintexts processed by the target cipher. We present a method for choosing plaintexts for a straightforward recovery of the encryption/decryption key by side-channel analysis without any template attack-like profiling phase of the device. Finally, we demonstrate the validity of our method with experiments on fully unrolled implementations of PRINCE and MANTIS. The result shows that our chosen-input attack is significantly more efficient than the corresponding known-input attacks.
AB - Lightweight ciphers designed with a fully unrolled architecture, capable of encryption/decryption in a single clock cycle, have gained momentum in the last few years. They've shown that very low latency encryption/decryption is possible with modest costs in comparison with traditional round-based designs. This paper explores how to most efficiently perform side-channel analysis against such unrolled cryptographic hardware in a setting where the adversary may freely choose the plaintexts processed by the target cipher. We present a method for choosing plaintexts for a straightforward recovery of the encryption/decryption key by side-channel analysis without any template attack-like profiling phase of the device. Finally, we demonstrate the validity of our method with experiments on fully unrolled implementations of PRINCE and MANTIS. The result shows that our chosen-input attack is significantly more efficient than the corresponding known-input attacks.
KW - cryptographic hardware
KW - light-weight cryptography
KW - MANTIS
KW - PRINCE
KW - side-channel attacks
KW - unrolled architectures
UR - http://www.scopus.com/inward/record.url?scp=85019606029&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85019606029&partnerID=8YFLogxK
U2 - 10.1109/ISQED.2017.7918332
DO - 10.1109/ISQED.2017.7918332
M3 - Conference contribution
AN - SCOPUS:85019606029
T3 - Proceedings - International Symposium on Quality Electronic Design, ISQED
SP - 301
EP - 306
BT - Proceedings of the 18th International Symposium on Quality Electronic Design, ISQED 2017
PB - IEEE Computer Society
T2 - 18th International Symposium on Quality Electronic Design, ISQED 2017
Y2 - 14 March 2017 through 15 March 2017
ER -