Paper 2016/993

Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks

Liran Lerman, Olivier Markowitch, and Nikita Veshchikov

Abstract

Side-channel attacks exploit physical characteristics of implementations of cryptographic algorithms in order to extract sensitive information such as the secret key. These physical attacks are among the most powerful attacks against real-world cryptosystems. This paper analyses the non-linear part (called Sboxes) of ciphers, which is often targeted by implementation attacks. We analyse Sboxes of several candidates that were sub- mitted to the competition on authenticated encryption (CAESAR) as well as several other ciphers. We compare theoretical metrics with results from simulations and with real experiments. In this paper, we demonstrate that, in some contexts, the theoretical metrics provide no information on the resiliency of the Sboxes against side-channel attacks.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Asian HOST 2016
Keywords
boolean functionsSboxside-channel attackssimulation
Contact author(s)
nikita veshchikov @ ulb ac be
History
2016-10-17: received
Short URL
https://ia.cr/2016/993
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/993,
      author = {Liran Lerman and Olivier Markowitch and Nikita Veshchikov},
      title = {Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks},
      howpublished = {Cryptology ePrint Archive, Paper 2016/993},
      year = {2016},
      note = {\url{https://eprint.iacr.org/2016/993}},
      url = {https://eprint.iacr.org/2016/993}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.