Abstract
Many crypto-algorithms, Deep-Learning, DSP compute on words larger than 8-bit. SCA attacks can easily be done on Boolean operations like XOR, AND, OR, and substitution operations like s-box, p-box or q-box, as 8-bit hypothesis or less are enough to forge attacks. However, attacking larger hypothesis word increases exponentially required resources: memory and computation power. Considering multiplication, 32-bit operation implies \(2^{32}\) hypotheses. Then a direct SCA attack cannot be efficiently performed. We propose to perform instead 4 small 8-bit SCA attacks. 32-bit attack complexity is reduced to 8-bit only complexity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_25
Assad El, S., et al.: Chaos-based block ciphers: an overview. In: IEEE 10th International Conference on Communications, COMM-2014, pp. 23–26. Romania, May, Bucharest (2014)
El Assad, F.: A new chaos-based image encryption system. Signal Process. Image Commun. 41, 144–157 (2016)
Gautier, G., El Assad, S.: Design and efficient implementations of a chaos-based stream cipher for securing Internet of Things (2017)
Gautier, G., El Assad, S.: A promising chaos-based stream cipher (2018)
Batina, L., Bhasin, S., Jap, D., Picek, S.: CSI neural network - using side-channels to recover your artificial neural network information. arXiv:1810.09076v1 [cs.CR], 22 October 2018
Moellic, P.-A.: The dark side of neural networks: an advocacy for security in machine learning. J1–05. CESAR (2018)
Oswald, D., Paar, C.: Improving side-channel analysis with optimal pre-processing, p. 16. CARDIS (2012)
Bansal, H.O., Sharma, R., Shreeraman, P.R.: PID controller tuning techniques - a review. J. Control Eng. Technol JCET. 2(4), 168–176 (2012). www.vkingpub.com
Physically Unclonable Function - PUF, SR2I301. https://perso.telecom-paristech.fr/danger/SR2I301/PUF.pdf
Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-28632-5_2
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Nguyen, R., Facon, A., Guilley, S., Gautier, G., El Assad, S. (2019). Speed-up of SCA Attacks on 32-bit Multiplications. In: Carlet, C., Guilley, S., Nitaj, A., Souidi, E. (eds) Codes, Cryptology and Information Security. C2SI 2019. Lecture Notes in Computer Science(), vol 11445. Springer, Cham. https://doi.org/10.1007/978-3-030-16458-4_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-16458-4_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16457-7
Online ISBN: 978-3-030-16458-4
eBook Packages: Computer ScienceComputer Science (R0)