Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform
2009; Springer Science+Business Media; Linguagem: Inglês
10.1007/978-3-642-11145-7_3
ISSN1611-3349
AutoresYang Li, Kazuo Sakiyama, S. Kawamura, Yuichi Komano, Kazuo Ohta,
Tópico(s)Physical Unclonable Functions (PUFs) and Hardware Security
ResumoAt CHES 2006, Prouff et al. proposed a novel S-box calculation based on the discrete Fourier transform as a first-order DPA countermeasure. At CHES 2008, Coron et al. showed that the original countermeasure can be broken by first-order DPA due to a biased mask and they proposed an improved algorithm. This paper shows that there is still a flaw in the Coron's S-box algorithm with respect to a practical software implementation. We pre-process the power traces to separate them into two subgroups, each has a biased mask. For the separated power traces, we propose two post analysis methods to identify the key. One is based on CPA attack against one subgroup, and the other is utilizing the difference of means for two subgroups and a pattern matching. Finally, we compare these two attack methods and propose an algorithm level countermeasure to enhance the security of Coron's S-box.
Referência(s)