Confused by confusion: Systematic evaluation of DPA resistance of various S-boxes

42Citations
Citations of this article
29Readers
Mendeley users who have this article in their library.
Get full text

Abstract

When studying the DPA resistance of S-boxes, the research community is divided in their opinions on what properties should be considered. So far, there exist only a few properties that aim at expressing the resilience of S-boxes to side-channel attacks. Recently, the confusion coefficient property was defined with the intention to characterize the resistance of an S-box. However, there exist no experimental results or methods for creating S-boxes with a “good” confusion coefficient property. In this paper, we employ a novel heuristic technique to generate S-boxes with “better” values of the confusion coefficient in terms of improving their side-channel resistance. We conduct extensive side-channel analysis and detect S-boxes that exhibit previously unseen behavior. For the 4×4 size we find S-boxes that belong to optimal classes, but they exhibit linear behavior when running a CPA attack, therefore preventing an attacker from achieving 100% success rate on recovering the key.

Cite

CITATION STYLE

APA

Picek, S., Papagiannopoulos, K., Ege, B., Batina, L., & Jakobovic, D. (2014). Confused by confusion: Systematic evaluation of DPA resistance of various S-boxes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8885, pp. 374–390). Springer Verlag. https://doi.org/10.1007/978-3-319-13039-2_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free