Abstract
For the power consumption model called Hamming weight model, we rewrite DPA attacks in terms of correlation coefficients between two Boolean functions. We exhibit properties of S-boxes (also called (n,m)-functions) relied on DPA attacks. We show that these properties are opposite to the non-linearity criterion and to the propagation criterion. To quantify the resistance of an S-box to DPA attacks, we introduce the notion of transparency order of an S -box and we study this new criterion with respect to the non-linearity and to the propagation criterion.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Akkar, M.-L., Bévan, R., Dischamp, P., Moyart, D.: Power analysis, what is now possible. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 489–502. Springer, Heidelberg (2000)
Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology 4(1), 3–72 (1991)
Brier, É., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004)
Chari, S., Jutla, C., Rao, J., Rohatgi, P.: Towards Sound Approaches to Counteract Power-Analysis Attacks. In: Wiener [33], pp. 398–412
Clavier, C., Coron, J.-S., Dabbous, N.: Differential power analysis in the presence of hardware countermeasures. In: Koç and Paar [15], pp. 252–263
Coron, J.-S., Kocher, P., Naccache, D.: Statistics and secret leakage. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, p. 157. Springer, Heidelberg (2001)
Evertse, J.: Linear structures in block ciphers. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol. 304, pp. 249–266. Springer, Heidelberg (1988)
Goubin, L., Patarin, J.: DES and Differential Power Analysis – The Duplication Method. In: Koç and Paar [14], pp. 158–172
Guilley, S., Hoogvorst, P., Pascalet, R.: Differential power analysis model and some results. In: Quisquater, J.-J., Paradinas, P., Deswarte, Y., Kalam, A.E. (eds.) Smart Card Research and Advanced Applications VI – CARDIS 2004, pp. 127–142. Kluwer Academic Publishers, Dordrecht (2004)
Harpes, C.: Cryptanalysis of iterated block ciphers. In: ETH Series in Information Processing, vol. 7. Hartung-Gorre Verlag, Konstanz (1996)
Hasan, A.A.: Power analysis attacks and algorithmic approaches to their countermeasures for Koblitz cryptosystems. In: Koç and Paar [15], pp. 93–108
Helleseth, T., Kumar, P.V.: Sequences with low correlation. In: Handbook of coding theory, Vol. II, pp. 1765–1853. North-Holland, Amsterdam (1998)
Knudsen, L.: Truncated and Higher Order Differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 196–211. Springer, Heidelberg (1995)
Kocher, P.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener [33], pp. 388–397.
Kukorelly, Z.: On the validity of certain hypotheses used in linear cryptanalysis. In: ETH Series in Information Processing, vol. 13. Hartung-Gorre Verlag, Konstanz (1999)
Lai, X.: Higher order derivatives and differential cryptanalysis. In: Symposium on Communication, Coding and Cryptography (1994); en l’honneur de J.L. Massey à l’occasion de son 60ème anniversaire
MacWilliams, F.J., Sloane, N.J.A.: The theory of error-correcting codes. North-Holland Mathematical Library, vol. 16. North-Holland Publishing Co., Amsterdam (1977)
Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)
Mayer Sommer, R.: Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards. In: Koç and Paar [15], pp. 78–92
Messerges, T.: Power Analysis Attacks and Countermeasures for Cryptographic Algorithms. PhD thesis, University of Illinois (2000)
Messerges, T., Dabbish, E., Sloan, R.: Investigations of Power Analysis Attacks on Smartcards. In: The USENIX Workshop on Smartcard Technology (Smartcard 1999), pp. 151–161 (1999)
Messerges, T., Dabbish, E., Sloan, R.: Power Analysis Attacks of Modular Exponentiation in Smartcard. In: Koç and Paar [14], pp. 144–157
Messerges, T., Dabbish, E., Sloan, R.: Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Transactions on Computers 51(5) (May 2002)
National Bureau of Standards. FIPS PUB 46: The Data Encryption Standard (January 1977)
National Institute of Standards and Technology. FIPS PUB 197: Advanced Encryption Standard (2001)
Oswald, E.: On Side-Channel Attacks and the Application of Algorithmic Countermeasures. PhD thesis, Institute for Applied Information Processing and Communications - Graz University of Technology (May 2003)
Preneel, B., Govaerts, R., Vandewalle, J.: Boolean functions satisfying higher order propagation criteria. In: Pichler, F. (ed.) EUROCRYPT 1985. LNCS, vol. 219, pp. 141–152. Springer, Heidelberg (1985)
Rothaus, O.S.: On bent functions. Journal of Combinatorial Theory 20a, 300–305 (1976)
Webster, A.F., Tavares, S.: On the design of S-boxes. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 523–534. Springer, Heidelberg (1986)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Prouff, E. (2005). DPA Attacks and S-Boxes. In: Gilbert, H., Handschuh, H. (eds) Fast Software Encryption. FSE 2005. Lecture Notes in Computer Science, vol 3557. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11502760_29
Download citation
DOI: https://doi.org/10.1007/11502760_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26541-2
Online ISBN: 978-3-540-31669-5
eBook Packages: Computer ScienceComputer Science (R0)