Advertisement

Lightweight Countermeasure to Differential-Plaintext Attacks on Permutation Ciphers

  • Matthew LewandowskiEmail author
  • Srinivas Katkoori
Conference paper
  • 19 Downloads
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 574)

Abstract

Many lightweight permutation based block ciphers have emerged for the use of encryption and security in the Internet of Things (IoT). However, recent work has shown a critical vulnerability in these ciphers due to the employment of static permutation networks in their architectures; Side-Channel Analysis and Differntial-Plaintext Attack (SCADPA) can be effectively performed on any cipher utilizing permutation networks. In this work, we present a lightweight solution for combating SCADPA. We demonstrate how this countermeasure can be employed on existing ciphers using the lightweight IoT PRESENT-80 cipher, providing multiple architectural implementations, and comparing the performance of these modified architectures against the unaltered PRESENT-80 cipher. Additionally, we analyze how this countermeasure impacts the resilience for all permutation ciphers when considering this attack scheme and provide alternative implementations and possible enhancements.

Keywords

Ciphers Countermeasures Differential-Plaintext Attack Encryption Permutation networks Side-Channel Analysis SCADPA 

References

  1. 1.
    Spartan-6 fpga configurable logic block user guide. https://www.xilinx.com/support/documentation/user_guides/ug384.pdf
  2. 2.
    Ara, T., Shah, P.G., Prabhakar, M.: Dynamic key dependent S-Box for symmetric encryption for IoT devices. In: 2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC), pp. 1–5 (2018).  https://doi.org/10.1109/ICAECC.2018.8479442
  3. 3.
    Bogdanov, A., et al.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007).  https://doi.org/10.1007/978-3-540-74735-2_31CrossRefGoogle Scholar
  4. 4.
    Breier, J., Jap, D., Bhasin, S.: SCADPA: side-channel assisted differential-plaintext attack on bit permutation based ciphers. In: 2018 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1129–1134 (2018).  https://doi.org/10.23919/DATE.2018.8342180
  5. 5.
    Bin Dai, Z., Xiang, N.: Fast bit permutation instruction based on omega+omega network. In: 2007 7th International Conference on ASIC, pp. 153–156 (2007).  https://doi.org/10.1109/ICASIC.2007.4415590
  6. 6.
    De Cnudde, T., Nikova, S.: Securing the present block cipher against combined side-channel analysis and fault attacks. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 25(12), 3291–3301 (2017).  https://doi.org/10.1109/TVLSI.2017.2713483CrossRefGoogle Scholar
  7. 7.
    Guttman, B., Roback, E.A.: SP 800–12. An Introduction to Computer Security: The NIST Handbook (1995)Google Scholar
  8. 8.
    Lee, R.B., Shi, Z., Yang, X.: Efficient permutation instructions for fast software cryptography. IEEE Micro 21(6), 56–69 (2001).  https://doi.org/10.1109/40.977759CrossRefGoogle Scholar
  9. 9.
    Li, H., Gao, F.: Design and implementation of reconfigurable bit permutation system based on Waksman network. In: 2010 Third International Conference on Information and Computing, vol. 2, pp. 113–116 (2010).  https://doi.org/10.1109/ICIC.2010.122
  10. 10.
    Nejad, F.H., Sabah, S., Jam, A.J.: Analysis of Avalanche effect on advance encryption standard by using dynamic S-Box depends on rounds keys. In: 2014 International Conference on Computational Science and Technology (ICCST), pp. 1–5 (2014).  https://doi.org/10.1109/ICCST.2014.7045184
  11. 11.
    Portz, M.: On the use of interconnection networks in cryptography. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 302–315. Springer, Heidelberg (1991).  https://doi.org/10.1007/3-540-46416-6_26CrossRefzbMATHGoogle Scholar
  12. 12.
    Poschmann, A., Moradi, A., Khoo, K., Lim, C., Wang, H., Ling, S.: Side-channel resistant crypto for less than 2300 GE. J. Cryptol. 24(2), 332–345 (2011)CrossRefGoogle Scholar
  13. 13.
    Shannon, C.E.: Communication theory of secrecy systems Google Scholar
  14. 14.
    Stallings, W., Brown, L.: Computer Security: Principles and Practice, 1st edn. Prentice Hall Press, Upper Saddle River (2008)Google Scholar
  15. 15.
    Yang, X., Lee, R.B.: Fast subword permutation instructions using omega and flip network stages. In: Proceedings 2000 International Conference on Computer Design, pp. 15–22 (2000).  https://doi.org/10.1109/ICCD.2000.878264
  16. 16.
    Young, C.P., Chia, C.C., Chen, L.B., Huang, I.J.: On-chip-network cryptosystem: a high throughput and high security architecture. In: APCCAS 2008–2008 IEEE Asia Pacific Conference on Circuits and Systems, pp. 1276–1279 (2008).  https://doi.org/10.1109/APCCAS.2008.4746260

Copyright information

© IFIP International Federation for Information Processing 2020

Authors and Affiliations

  1. 1.University of South FloridaTampaUSA

Personalised recommendations