Skip to main content

Speed-up of SCA Attacks on 32-bit Multiplications

  • Conference paper
  • First Online:
Book cover Codes, Cryptology and Information Security (C2SI 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11445))

Abstract

Many crypto-algorithms, Deep-Learning, DSP compute on words larger than 8-bit. SCA attacks can easily be done on Boolean operations like XOR, AND, OR, and substitution operations like s-box, p-box or q-box, as 8-bit hypothesis or less are enough to forge attacks. However, attacking larger hypothesis word increases exponentially required resources: memory and computation power. Considering multiplication, 32-bit operation implies \(2^{32}\) hypotheses. Then a direct SCA attack cannot be efficiently performed. We propose to perform instead 4 small 8-bit SCA attacks. 32-bit attack complexity is reduced to 8-bit only complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_25

    Chapter  Google Scholar 

  2. Assad El, S., et al.: Chaos-based block ciphers: an overview. In: IEEE 10th International Conference on Communications, COMM-2014, pp. 23–26. Romania, May, Bucharest (2014)

    Google Scholar 

  3. El Assad, F.: A new chaos-based image encryption system. Signal Process. Image Commun. 41, 144–157 (2016)

    Article  Google Scholar 

  4. Gautier, G., El Assad, S.: Design and efficient implementations of a chaos-based stream cipher for securing Internet of Things (2017)

    Google Scholar 

  5. Gautier, G., El Assad, S.: A promising chaos-based stream cipher (2018)

    Google Scholar 

  6. Batina, L., Bhasin, S., Jap, D., Picek, S.: CSI neural network - using side-channels to recover your artificial neural network information. arXiv:1810.09076v1 [cs.CR], 22 October 2018

  7. Moellic, P.-A.: The dark side of neural networks: an advocacy for security in machine learning. J1–05. CESAR (2018)

    Google Scholar 

  8. Oswald, D., Paar, C.: Improving side-channel analysis with optimal pre-processing, p. 16. CARDIS (2012)

    Google Scholar 

  9. Bansal, H.O., Sharma, R., Shreeraman, P.R.: PID controller tuning techniques - a review. J. Control Eng. Technol JCET. 2(4), 168–176 (2012). www.vkingpub.com

    Google Scholar 

  10. Physically Unclonable Function - PUF, SR2I301. https://perso.telecom-paristech.fr/danger/SR2I301/PUF.pdf

  11. Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-28632-5_2

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sylvain Guilley .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nguyen, R., Facon, A., Guilley, S., Gautier, G., El Assad, S. (2019). Speed-up of SCA Attacks on 32-bit Multiplications. In: Carlet, C., Guilley, S., Nitaj, A., Souidi, E. (eds) Codes, Cryptology and Information Security. C2SI 2019. Lecture Notes in Computer Science(), vol 11445. Springer, Cham. https://doi.org/10.1007/978-3-030-16458-4_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-16458-4_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-16457-7

  • Online ISBN: 978-3-030-16458-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics