Paper 2016/993
Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks
Liran Lerman, Olivier Markowitch, and Nikita Veshchikov
Abstract
Side-channel attacks exploit physical characteristics of implementations of cryptographic algorithms in order to extract sensitive information such as the secret key. These physical attacks are among the most powerful attacks against real-world cryptosystems. This paper analyses the non-linear part (called Sboxes) of ciphers, which is often targeted by implementation attacks. We analyse Sboxes of several candidates that were sub- mitted to the competition on authenticated encryption (CAESAR) as well as several other ciphers. We compare theoretical metrics with results from simulations and with real experiments. In this paper, we demonstrate that, in some contexts, the theoretical metrics provide no information on the resiliency of the Sboxes against side-channel attacks.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Published elsewhere. Asian HOST 2016
- Keywords
- boolean functionsSboxside-channel attackssimulation
- Contact author(s)
- nikita veshchikov @ ulb ac be
- History
- 2016-10-17: received
- Short URL
- https://ia.cr/2016/993
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2016/993, author = {Liran Lerman and Olivier Markowitch and Nikita Veshchikov}, title = {Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks}, howpublished = {Cryptology {ePrint} Archive, Paper 2016/993}, year = {2016}, url = {https://eprint.iacr.org/2016/993} }