Side-Channel Analysis of Multiplications in GF$(2^{128})$ - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2014

Side-Channel Analysis of Multiplications in GF$(2^{128})$

Résumé

In this paper, we study the side-channel security of the field multiplication in GF(2^n). We particularly focus on GF(2^128) multiplication which is the one used in the authentication part of AES−GCM but the proposed attack also applies to other binary extensions. In a hardware implementation using a 128-bit multiplier, the full 128-bit secret is manipulated at once. In this context, classical DPA attacks based on the divide and conquer strategy cannot be applied. In this work, the algebraic structure of the multiplication is leveraged to recover bits of information about the secret multiplicand without having to perform any key-guess. To do so, the leakage corresponding to the writing of the multiplication output into a register is considered. It is assumed to follow a Hamming weight/distance leakage model. Under these particular, yet easily met, assumption we exhibit a nice connection between the key recovery problem and some classical coding and Learning Parities with Noise problems with certain instance parameters. In our case, the noise is very high, but the length of the secret is rather short. In this work we investigate different solving techniques corresponding to different attacker models and eventually refine the attack when considering particular implementations of the multiplication.

Dates et versions

hal-01093865 , version 1 (11-12-2014)

Identifiants

Citer

Sonia Belaïd, Benoît Gérard, Pierre-Alain Fouque. Side-Channel Analysis of Multiplications in GF$(2^{128})$: Application to AES-GCM. Asiacrypt 2014, Dec 2014, Kaohsiung, Taiwan. ⟨10.1007/978-3-662-45608-8_17⟩. ⟨hal-01093865⟩
232 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More