On the Security of NOEKEON against Side Channel Cube Attacks

In this paper, we investigate the security of the NOEKEON block cipher against side channel cube attacks. NOEKEON was proposed by Daemen et al. for the NESSIE project. The block size and the key size are both 128 bits. The cube attack, introduced by Dinur and Shamir at EUROCRYPT 2009, is a new type...

詳細記述

保存先:
書誌詳細
主要な著者: Abdul-Latip, S. F., Reyhanitabar, M. R., Susilo, W., Seberry, J.
その他の著者: Kwak, Jin
フォーマット: Conference or Workshop Item
言語:English
出版事項: Springer Berlin / Heidelberg 2010
主題:
オンライン・アクセス:http://eprints.utem.edu.my/id/eprint/83/1/ISPEC_2010.pdf
http://eprints.utem.edu.my/id/eprint/83/
http://dx.doi.org/10.1007/978-3-642-12827-1_4
タグ: タグ追加
タグなし, このレコードへの初めてのタグを付けませんか!
id my.utem.eprints.83
record_format eprints
spelling my.utem.eprints.832015-05-28T02:16:40Z http://eprints.utem.edu.my/id/eprint/83/ On the Security of NOEKEON against Side Channel Cube Attacks Abdul-Latip, S. F. Reyhanitabar, M. R. Susilo, W. Seberry, J. QA75 Electronic computers. Computer science In this paper, we investigate the security of the NOEKEON block cipher against side channel cube attacks. NOEKEON was proposed by Daemen et al. for the NESSIE project. The block size and the key size are both 128 bits. The cube attack, introduced by Dinur and Shamir at EUROCRYPT 2009, is a new type of algebraic cryptanalysis. The attack may be applied if the adversary has access to a single bit of information that can be represented by a low degree multivariate polynomial over GF(2) of secret and public variables. In the side channel attack model, the attacker is assumed to have access to some leaked information about the internal state of the cipher as well as the plaintext and ciphertext. Adopting the notion of a single bit leakage as formalized by Dinur and Shamir, we assume that the attacker has only one bit of information about the intermediate state after each round. Using this side channel attack model, we show that it is possible to extract 60 independent linear equations over 99 (out of 128) key variables. To recover the whole 128-bit key, the attack requires only about 210 chosen plaintext and O(268) time complexity. Springer Berlin / Heidelberg Kwak, Jin Deng, Robert Won, Yoojae Wang, Guilin 2010 Conference or Workshop Item PeerReviewed application/pdf en http://eprints.utem.edu.my/id/eprint/83/1/ISPEC_2010.pdf Abdul-Latip, S. F. and Reyhanitabar, M. R. and Susilo, W. and Seberry, J. (2010) On the Security of NOEKEON against Side Channel Cube Attacks. In: ISPEC 2010. http://dx.doi.org/10.1007/978-3-642-12827-1_4
institution Universiti Teknikal Malaysia Melaka
building UTEM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknikal Malaysia Melaka
content_source UTEM Institutional Repository
url_provider http://eprints.utem.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Abdul-Latip, S. F.
Reyhanitabar, M. R.
Susilo, W.
Seberry, J.
On the Security of NOEKEON against Side Channel Cube Attacks
description In this paper, we investigate the security of the NOEKEON block cipher against side channel cube attacks. NOEKEON was proposed by Daemen et al. for the NESSIE project. The block size and the key size are both 128 bits. The cube attack, introduced by Dinur and Shamir at EUROCRYPT 2009, is a new type of algebraic cryptanalysis. The attack may be applied if the adversary has access to a single bit of information that can be represented by a low degree multivariate polynomial over GF(2) of secret and public variables. In the side channel attack model, the attacker is assumed to have access to some leaked information about the internal state of the cipher as well as the plaintext and ciphertext. Adopting the notion of a single bit leakage as formalized by Dinur and Shamir, we assume that the attacker has only one bit of information about the intermediate state after each round. Using this side channel attack model, we show that it is possible to extract 60 independent linear equations over 99 (out of 128) key variables. To recover the whole 128-bit key, the attack requires only about 210 chosen plaintext and O(268) time complexity.
author2 Kwak, Jin
author_facet Kwak, Jin
Abdul-Latip, S. F.
Reyhanitabar, M. R.
Susilo, W.
Seberry, J.
format Conference or Workshop Item
author Abdul-Latip, S. F.
Reyhanitabar, M. R.
Susilo, W.
Seberry, J.
author_sort Abdul-Latip, S. F.
title On the Security of NOEKEON against Side Channel Cube Attacks
title_short On the Security of NOEKEON against Side Channel Cube Attacks
title_full On the Security of NOEKEON against Side Channel Cube Attacks
title_fullStr On the Security of NOEKEON against Side Channel Cube Attacks
title_full_unstemmed On the Security of NOEKEON against Side Channel Cube Attacks
title_sort on the security of noekeon against side channel cube attacks
publisher Springer Berlin / Heidelberg
publishDate 2010
url http://eprints.utem.edu.my/id/eprint/83/1/ISPEC_2010.pdf
http://eprints.utem.edu.my/id/eprint/83/
http://dx.doi.org/10.1007/978-3-642-12827-1_4
_version_ 1665905238408691712
score 13.251813