• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2019 Fiscal Year Annual Research Report

General and Efficient Masking Strategy for Fixed Secret Value Against Side-Channel Attacks

Research Project

Project/Area Number 19K21529
Allocation TypeMulti-year Fund
Research InstitutionThe University of Electro-Communications

Principal Investigator

李 陽  電気通信大学, 大学院情報理工学研究科, 准教授 (20821812)

Project Period (FY) 2019-04-01 – 2020-03-31
KeywordsAES / Side-Channel Attacks / Mask
Outline of Annual Research Achievements

In this research, we largely improved the key recovery efficiency for the simple power analysis on the masked expanded AES round keys. Compared to existing work, we improved the key recovery speed up to 95%. In a certain scenario, the key recovery success rate is improved from 47% to 96%. These improvements come from several techniques as (1) new data structure in the key recovery, (2) improved information extraction from Hamming weights, (3) full usage of all leakage traces, and (4) optimized recovery sequence of the key bytes. We further extended the improved key recovery architecture considering more variations of the leakage model and the noise model. We designed a masking scheme to achieve the highest key recovery complexity using the limited randomness. The key concept is to maximize the computational distance between the key bytes using the same mask. We summarized the relationship between the security evaluation result and the masking schemes based on the established key recovery architecture. These relationships will be formalized to a few design principles of the masking schemes. The related research result is under submission.
Besides, inspired by this project, 1. we identified the unexpected information leakage of the alarm signal sent by a laser sensor that detects irregular current; 2. we investigated the possibility and the noise tolerance for the physical attack using the leakage from 5th AES round; and 3. we improved the key recovery efficiency of the template attack for recently proposed long-distance side-channel attack named screaming channel attack.

  • Research Products

    (4 results)

All 2020 2019

All Journal Article (1 results) (of which Peer Reviewed: 1 results) Presentation (3 results)

  • [Journal Article] Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser Sensor2020

    • Author(s)
      Li Yang、Hatano Ryota、Tada Sho、Matsuda Kohei、Miura Noriyuki、Sugawara Takeshi、Sakiyama Kazuo
    • Journal Title

      Proceeding of International Conferences on Information Security and Cryptology

      Volume: LNCS, volume 12020 Pages: 346~361

    • DOI

      https://doi.org/10.1007/978-3-030-42921-8_20

    • Peer Reviewed
  • [Presentation] AESへの5ラウンドの物理攻撃の可能性の考察2020

    • Author(s)
      高見豪, 菅原健, 崎山一男, 李陽
    • Organizer
      2020年暗号と情報セキュリティシンポジウム
  • [Presentation] 無線通信から収集した電磁波を用いたテンプレート攻撃研究2020

    • Author(s)
      杉本悠馬, 菅原健, 崎山一男, 李陽
    • Organizer
      2020年暗号と情報セキュリティシンポジウム
  • [Presentation] AESに対する5ラウンド攻撃の物理攻撃への応用検討2019

    • Author(s)
      高見豪, 菅原健, 崎山一男, 李陽
    • Organizer
      IEICE2019年ソサイエティ大会

URL: 

Published: 2021-01-27  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi