Abstract
This paper present two new attacks on two lightweight authenticated encryption with associated data (AEAD): Sparkle and \(\textsf{Elephant}\). These attacks are blind side channel analysis (BSCA). The leakage is considered as an Hamming weight (HW) with a Gaussian noise. In both attacks, a belief propagation (BP) algorithm is used to link the different leaks. Another objective is to present BSCA as a new tool for evaluating the robustness of a symmetric cryptographic primitive subfunctions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
NIST. Lightweight Cryptography Standardization Process (2018)
Ouladj, M., Guilley, S.: Side-channel analysis of embedded systems. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-77222-2
NIST. Specification for the Advanced Encryption Standard. FIPS PUB 197 (2001)
Berti, F., et al.: A finer-grain analysis of the leakage (non) resilience of OCB. IACR T CHES (2022)
Sim, S.M., Jap, D., Bhasin, S.: Differential analysis aided power attack on (non-) linear feedback shift registers. IACR TCHES (2021)
Adomnicai, A., Masson, L., Fournier, J.J.A.: Practical algebraic side-channel attacks against ACORN. In: Lee, K. (ed.) ICISC 2018. LNCS, vol. 11396, pp. 325–340. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-12146-4_20
Banciu, V., Oswald, E., Whitnall, C.: Exploring the resilience of some lightweight ciphers against profiled single trace attacks. In: Mangard, S., Poschmann, A.Y. (eds.) COSADE 2014. LNCS, vol. 9064, pp. 51–63. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-21476-4_4
Beyne, T., Chen, Y.L., Dobraunig, C., Mennink, B.: Elephant v2. NIST lightweight competition (2021)
Beierle, C., et al.: Schwaemm and esch: lightweight authenticated encryption and hashing using the sparkle permutation family. NIST Round 2 (2019)
Meraneh, M.H., Clavier, C., Le Bouder, H., Maillard, J., Thomas, G.: Blind side channel on the elephant LFSR (2022)
Maillard, J., Meraneh, A.H., Sarry, M., Clavier, C., Bouder, H.L., Thomas, G.: Blind side channel analysis on the Elephant LFSR extended version. In: In: Van Sinderen, M., Wijnhoven, F., Hammoudi, S., Samarati, P., Vimercati, S.D.C.d. (eds.) E-Business and Telecommunications. ICSBT SECRYPT 2022. Communications in Computer and Information Science, vol. 1849, pp. 20–42. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-45137-9_2
Barber, D.: Bayesian Reasoning and Machine Learning. Cambridge University Press, Cambridge (2011)
Dobraunig, C., Eichlseder, M., Mendel, F., Schläffer, M.: Ascon. Submission to the CAESAR Competition (2014)
Beyne, T., Chen, Y.L., Dobraunig, C., Mennink, B.: Dumbo, jumbo, and delirium: parallel authenticated encryption for the lightweight circus. IACR Trans. Symmetric Cryptology. 2020, 5–30 (2020)
Bernstein, D.J.: How to stretch random functions: Secur. Protected Counter Sums. J. Cryptol. (1999)
Luykx, A., Preneel, B., Tischhauser, E., Yasuda, K.: A MAC mode for lightweight block ciphers. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 43–59. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-52993-5_3
Granger, R., Jovanovic, P., Mennink, B., Neves, S.: Improved masking for tweakable blockciphers with applications to authenticated encryption. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9665, pp. 263–293. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49890-3_11
Bogdanov, A., Knežević, M., Leander, G., Toz, D., Varıcı, K., Verbauwhede, I.: spongent: a lightweight hash function. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 312–325. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23951-9_21
Chakraborti, A., Datta, N., Nandi, M., Yasuda, K.: Beetle family of lightweight and secure authenticated encryption ciphers. IACR TCHES. (2018)
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Duplexing the sponge: single-pass authenticated encryption and other applications. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 320–337. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-28496-0_19
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_25
Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-28632-5_2
Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual information analysis. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 426–442. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-85053-3_27
Samwel, N., Daemen, J.: DPA on hardware implementations of Ascon and Keyak. In: Computing Frontiers Conference. ACM (2017)
Linge, Y., Dumas, C., Lambert-Lacroix, S.: Using the joint distributions of a cryptographic function in side channel analysis. In: Prouff, E. (ed.) COSADE 2014. LNCS, vol. 8622, pp. 199–213. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10175-0_14
Le Bouder, H., Lashermes, R., Linge, Y., Thomas, G., Zie, J.-Y.: A multi-round side channel attack on AES using belief propagation. In: Cuppens, F., Wang, L., Cuppens-Boulahia, N., Tawbi, N., Garcia-Alfaro, J. (eds.) FPS 2016. LNCS, vol. 10128, pp. 199–213. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-51966-1_13
Clavier, C., Reynaud, L.: Improved blind side-channel analysis by exploitation of joint distributions of leakages. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 24–44. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66787-4_2
Clavier, C., Reynaud, L., Wurcker, A.: Quadrivariate improved blind side-channel analysis on Boolean masked AES. In: Fan, J., Gierlichs, B. (eds.) COSADE 2018. LNCS, vol. 10815, pp. 153–167. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-89641-0_9
Yli-Mäyry, V., et al.: Diffusional side-channel leakage from unrolled lightweight block ciphers: a case study of power analysis on PRINCE. IEEE Trans. Inf. Forensics Secur. 16, 1351–1364 (2020)
Gallager, R.G.:. Low-density parity-check codes. IRE Trans. Inf. Theory 8, 21–28 (1962)
Gallager, R.G.: Low Density Parity check codes. PhD thesis, MIT, Cambridge, MA (1963)
Chung, S.-Y., Forney Jr, G.D., Richardson, T.J., Urbanke, R.L.: On the design of low-density parity-check codes within 0.0045 dB of the Shannon limit. IEEE Commun. Lett. 5, 58–60 (2001)
Tanner, R.M.: A recursive approach to low complexity codes. IEEE Trans. Inf. Theory 27, 533–547 (1981)
Pearl, J.: Reverend bayes on inference engines: a distributed hierarchical approach. In: National Conference on Artificial Intelligence. AAAI Press (1982)
Veyrat-Charvillon, N., Gérard, B., Standaert, F.-X.: Soft analytical side-channel attacks. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8873, pp. 282–296. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45611-8_15
Grosso, V., Standaert, F.-X.: ASCA, SASCA and DPA with enumeration: which one beats the other and when? In: Iwata, T., Cheon, J.H. (eds.) ASIACRYPT 2015. LNCS, vol. 9453, pp. 291–312. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48800-3_12
Ouyang, W., Cham, W.K.: Fast algorithm for Walsh Hadamard transform on sliding windows. Trans. Pattern Anal. Mach. Intell. 32, 165–171 (2009)
Acknowledgments
This research is part of the APCIL project found by the Brittany region. The authors would like to thank Laurent Toutain.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Sarry, M., Le Bouder, H., Maaloouf, E., Thomas, G. (2024). Blind Side Channel Analysis Against AEAD with a Belief Propagation Approach. In: Bhasin, S., Roche, T. (eds) Smart Card Research and Advanced Applications. CARDIS 2023. Lecture Notes in Computer Science, vol 14530. Springer, Cham. https://doi.org/10.1007/978-3-031-54409-5_7
Download citation
DOI: https://doi.org/10.1007/978-3-031-54409-5_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-54408-8
Online ISBN: 978-3-031-54409-5
eBook Packages: Computer ScienceComputer Science (R0)