Controversy Corner: Efficient Hamming weight-based side-channel cube attacks on PRESENT

  • Authors:
  • Xinjie Zhao;Shize Guo;Fan Zhang;Tao Wang;Zhijie Shi;Huiying Liu;Keke Ji;Jing Huang

  • Affiliations:
  • Department of Information Engineering, Ordnance Engineering College, Shijiazhuang 050003, China and The Institute of North Electronic Equipment, Beijing 100083, China;The Institute of North Electronic Equipment, Beijing 100083, China;Department of Computer Science and Engineering, University of Connecticut, Storrs 06269, USA;Department of Information Engineering, Ordnance Engineering College, Shijiazhuang 050003, China;Department of Computer Science and Engineering, University of Connecticut, Storrs 06269, USA;Department of Information Engineering, Ordnance Engineering College, Shijiazhuang 050003, China;Department of Information Engineering, Ordnance Engineering College, Shijiazhuang 050003, China;Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China

  • Venue:
  • Journal of Systems and Software
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

The side-channel cube attack (SCCA) is a powerful cryptanalysis technique that combines the side-channel and cube attack. This paper proposes several advanced techniques to improve the Hamming weight-based SCCA (HW-SCCA) on the block cipher PRESENT. The new techniques utilize non-linear equations and an iterative scheme to extract more information from leakage. The new attacks need only 2^8^.^9^5 chosen plaintexts to recover 72 key bits of PRESENT-80 and 2^9^.^7^8 chosen plaintexts to recover 121 key bits of PRESENT-128. To the best of our knowledge, these are the most efficient SCCAs on PRESENT-80/128. To show the feasibility of the proposed techniques, real attacks have been conducted on PRESENT on an 8-bit microcontroller, which are the first SCCAs on PRESENT on a real device. The proposed HW-SCCA can successfully break PRESENT implementations even if they have some countermeasures such as random delay and masking.