Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks - Archive ouverte HAL Accéder directement au contenu
Article Dans Une Revue Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences Année : 2015

Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks

Christophe Clavier
DMI
Quentin Isorez
  • Fonction : Auteur
Marion Damien
DMI
Antoine Wurcker
  • Fonction : Auteur
DMI

Résumé

Despite Kerckhoffs’s principle, proprietary or otherwise secret cryptographic algorithms are still used in real life. For security and efficiency reasons a common design practice simply modifies some parameters of widely used and well studied encryption standards. In this paper, we investigate the feasibility of reverse engineering the secret specifications of an AES-like block cipher by a FIRE attack based on Ineffective Fault Analysis (IFA) or by SCARE techniques based on two models of collision power analysis. In the considered fault or observational models, we demonstrate that an adversary who does not know the secret key can recover the full set of secret parameters of an AES-like software implementation and, in some models, even if it is protected by common Boolean masking and shuffling of independent operations. We thereby intend to demonstrate that protecting the implementation of such AES-like function is not an option even if its specifications are not public.
Fichier non déposé

Dates et versions

hal-01218086 , version 1 (20-10-2015)

Identifiants

  • HAL Id : hal-01218086 , version 1

Citer

Christophe Clavier, Quentin Isorez, Marion Damien, Antoine Wurcker. Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2015, Volume 7 (Issue 1). ⟨hal-01218086⟩

Collections

UNILIM CNRS XLIM
164 Consultations
0 Téléchargements

Partager

Gmail Facebook X LinkedIn More