On some relations of SCA-related properties of S-box under the Hamming weight leakage mode
DOI:
https://doi.org/10.54654/isj.v2i17.902Keywords:
S-box, side-channel attacks, S-box properties, Pearson’s correlation coefficient, chi-squared testTóm tắt
Abstract— Physical implementations of cryptographic algorithms are vulnerable to so-called side-channel attacks, in which sensitive information can be recovered through the analysis of the leakages produced by the operating device. In the particular case of block ciphers, substitution boxes are often the target of such attacks, as they are the main nonlinear component of the cipher. Literature survey contains some definitions of theoretical properties to measure the resistance provided by substitution boxes with respect to the imminent threat of side-channel attacks. The fundamental questions we board in this paper are: are all these properties related? And if so, what can we tell of their relation? We pretend to bring some clarification to this subject using some well-known side-channel related properties of S-box.
Downloads
References
Golić, J. D., & Tymen, C. (2002, August). Multiplicative masking and power analysis of AES. In International Workshop on Cryptographic Hardware and Embedded Systems (pp. 198-212). Springer, Berlin, Heidelberg.
Matsui, M. (1993, May). Linear cryptanalysis method for DES cipher. In Workshop on the Theory and Application of Cryptographic Techniques (pp. 386-397). Springer, Berlin, Heidelberg.
Biham, E., & Shamir, A. (1991). Differential cryptanalysis of DES-like cryptosystems. Journal of CRYPTOLOGY, 4(1), 3-72.
Armknecht, F. (2004, February). Improving fast algebraic attacks. In International Workshop on Fast Software Encryption (pp. 65-82). Springer, Berlin, Heidelberg.
Guilley, S., Hoogvorst, P., & Pacalet, R. (2004). Differential power analysis model and some results. In Smart card research and advanced applications VI (pp. 127-142). Springer, Boston, MA.
Prouff, E. (2005, February). DPA attacks and S-box. In International Workshop on Fast Software Encryption (pp. 424-441). Springer, Berlin, Heidelberg.
Martınez-Dıaz, I., & Freyre-Echevarría, A. S-box with theoretical resistance against power attacks under Hamming leakage models. In V Seminario Científico Nacional de Criptografía. Sociedad Cubana de Matemática y Computación, 2020
Canteaut, A. (2016). Lecture notes on cryptographic Boolean functions. Inria, Paris, France, 3.
Carlet, Claude, Yves Crama, and Peter L. Hammer. "Vectorial Boolean Functions for Cryptography." (2010): 398-470.
Daemen, J., & Rijmen, V. (2002). The design of Rijndael (Vol. 2). New York: Springer-Verlag.
Chakraborty, K., Sarkar, S., Maitra, S., Mazumdar, B., Mukhopadhyay, D., & Prouff, E. (2017). Redefining the transparency order. Designs, codes and cryptography, 82(1), 95-115.
Li, H., Zhou, Y., Ming, J., Yang, G., & Jin, C. (2020). The notion of transparency order, revisited. The Computer Journal, 63(12), 1915-1938.
Picek, S., Papagiannopoulos, K., Ege, B., Batina, L., & Jakobovic, D. (2014, December). Confused by confusion: Systematic evaluation of DPA resistance of various s-box. In International Conference on Cryptology in India (pp. 374-390). Springer, Cham.
Ding, A. A., Zhang, L., Fei, Y., & Luo, P. (2014, September). A statistical model for higher order DPA on masked devices. In International Workshop on Cryptographic Hardware and Embedded Systems (pp. 147-169). Springer, Berlin, Heidelberg.
Fei, Y., Luo, Q., & Ding, A. A. (2012, September). A statistical model for DPA with novel algorithmic confusion analysis. In International Workshop on Cryptographic Hardware and Embedded Systems (pp. 233-250). Springer, Berlin, Heidelberg.A
Prinetto, P. E., & Cerini, S. Y. Empirical Evaluation of the Resilience of Novel S-Box Implementations Against Power Side-Channel Attacks.
Freyre Echevarría, A. (2020). Evolución híbrida de S-cajas no lineales resistentes a ataques de potencia Dept. Ciencia de la Computación, Univ. de La Habana, Havana, Cuba.
Medvedev, Yu.I., Ivchenko, G.I., Statistical Mathematics. URSS, 2014.
Li, H., Yang, G., Ming, J., Zhou, Y., & Jin, C. (2021). Transparency order versus confusion coefficient: a case study of NIST lightweight cryptography S-box. Cybersecurity, 4(1), 1-20.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).