ログイン 新規登録
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. 論文誌(ジャーナル)
  2. Vol.54
  3. No.7

Scan-based Attack against DES and Triple DES Cryptosystems Using Scan Signatures

https://ipsj.ixsq.nii.ac.jp/records/94389
https://ipsj.ixsq.nii.ac.jp/records/94389
eeeadbf4-ff1f-4f7a-ba53-19f8b971e42e
名前 / ファイル ライセンス アクション
IPSJ-JNL5407014.pdf IPSJ-JNL5407014 (2.0 MB)
Copyright (c) 2013 by the Information Processing Society of Japan
オープンアクセス
Item type Journal(1)
公開日 2013-07-15
タイトル
タイトル Scan-based Attack against DES and Triple DES Cryptosystems Using Scan Signatures
タイトル
言語 en
タイトル Scan-based Attack against DES and Triple DES Cryptosystems Using Scan Signatures
言語
言語 eng
キーワード
主題Scheme Other
主題 [一般論文] side-channel attacks, data encryption standard, triple data encryption standard, scan chain, scan-based attack
資源タイプ
資源タイプ識別子 http://purl.org/coar/resource_type/c_6501
資源タイプ journal article
著者所属
Waseda University
著者所属
Waseda University
著者所属
Waseda University
著者所属(英)
en
Waseda University
著者所属(英)
en
Waseda University
著者所属(英)
en
Waseda University
著者名 Hirokazu, Kodera

× Hirokazu, Kodera

Hirokazu, Kodera

Search repository
Masao, Yanagisawa

× Masao, Yanagisawa

Masao, Yanagisawa

Search repository
Nozomu, Togawa

× Nozomu, Togawa

Nozomu, Togawa

Search repository
著者名(英) Hirokazu, Kodera

× Hirokazu, Kodera

en Hirokazu, Kodera

Search repository
Masao, Yanagisawa

× Masao, Yanagisawa

en Masao, Yanagisawa

Search repository
Nozomu, Togawa

× Nozomu, Togawa

en Nozomu, Togawa

Search repository
論文抄録
内容記述タイプ Other
内容記述 A scan-path test is one of the useful design-for-test techniques, in which testers can observe and control registers inside the target LSI chip directly. On the other hand, the risk of side-channel attacks against cryptographic LSIs and modules has been pointed out. In particular, scan-based attacks which retrieve secret keys by analyzing scan data obtained from scan chains have been attracting attention. In this paper, we propose two scan-based attack methods against DES and Triple DES using scan signatures. Our proposed methods are based on focusing on particular bit-column-data in a set of scan data and observing their changes when giving several plaintexts. Based on this property, we introduce the idea of a scan signature first and apply it to DES cryptosystems. In DES cryptosystems, we can retrieve secret keys by partitioning the S-BOX process into eight independent sub-processes and reducing the number of the round key candidates from 248 to 26 × 8 = 512. In Triple DES cryptosystems, three secret keys are used to encrypt plaintexts. Then we retrieve them one by one, using the similar technique as in DES cryptosystems. Although some problems occur when retrieving the second/third secret key, our proposed method effectively resolves them. Our proposed methods can retrieve secret keys even if a scan chain includes registers except a crypto module and attackers do not know when the encryption is really done in the crypto module. Experimental results demonstrate that we successfully retrieve the secret keys of a DES cryptosystem using at most 32 plaintexts and that of a Triple DES cryptosystem using at most 36 plaintexts.

------------------------------
This is a preprint of an article intended for publication Journal of
Information Processing(JIP). This preprint should not be cited. This
article should be cited as: Journal of Information Processing Vol.21(2013) No.3 (online)
DOI http://dx.doi.org/10.2197/ipsjjip.21.572
------------------------------
論文抄録(英)
内容記述タイプ Other
内容記述 A scan-path test is one of the useful design-for-test techniques, in which testers can observe and control registers inside the target LSI chip directly. On the other hand, the risk of side-channel attacks against cryptographic LSIs and modules has been pointed out. In particular, scan-based attacks which retrieve secret keys by analyzing scan data obtained from scan chains have been attracting attention. In this paper, we propose two scan-based attack methods against DES and Triple DES using scan signatures. Our proposed methods are based on focusing on particular bit-column-data in a set of scan data and observing their changes when giving several plaintexts. Based on this property, we introduce the idea of a scan signature first and apply it to DES cryptosystems. In DES cryptosystems, we can retrieve secret keys by partitioning the S-BOX process into eight independent sub-processes and reducing the number of the round key candidates from 248 to 26 × 8 = 512. In Triple DES cryptosystems, three secret keys are used to encrypt plaintexts. Then we retrieve them one by one, using the similar technique as in DES cryptosystems. Although some problems occur when retrieving the second/third secret key, our proposed method effectively resolves them. Our proposed methods can retrieve secret keys even if a scan chain includes registers except a crypto module and attackers do not know when the encryption is really done in the crypto module. Experimental results demonstrate that we successfully retrieve the secret keys of a DES cryptosystem using at most 32 plaintexts and that of a Triple DES cryptosystem using at most 36 plaintexts.

------------------------------
This is a preprint of an article intended for publication Journal of
Information Processing(JIP). This preprint should not be cited. This
article should be cited as: Journal of Information Processing Vol.21(2013) No.3 (online)
DOI http://dx.doi.org/10.2197/ipsjjip.21.572
------------------------------
書誌レコードID
収録物識別子タイプ NCID
収録物識別子 AN00116647
書誌情報 情報処理学会論文誌

巻 54, 号 7, 発行日 2013-07-15
ISSN
収録物識別子タイプ ISSN
収録物識別子 1882-7764
戻る
0
views
See details
Views

Versions

Ver.1 2025-01-20 06:47:46.006966
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3