Power Analysis and Protection on BBC encoding LBlock Decryption Algorithm
GUAN Ming-Yang1,2, YU Guo-Rui1, XIANG Yi-Xi1, TAN Zhao-Nian1, ZHANG Guo-Shuang3, WANG An1,2
1. School of Computer Science, Beijing Institute of Technology, Beijing 100081, China
2. State Key Laboratory of Cryptology, P.O. Box 5159, Beijing 100878, China
3. Science and Technology on Information Assurance Laboratory, Beijing 100072, China
With the rapid development of the RFID chip, wireless sensor networks and other micro computing equipment, lightweight block ciphers are widely used and their security attracted more and more attention. Power Analysis, which brings huge threats to Cipher Chips, is a common technique in side channel analysis. This paper analyses LBlock cipher algorithm in intelligent IC cards, discusses the security of Bitwisely Balanced encoding (short for BBC) and finds some security flaw under the Power Analysis attack. First, through the analysis of the LBlock cryptography algorithm in BBC, we found effective attack position and through acquiring the trace that in that position to reconstruct the templates according to the hamming weight model structure, use the template attack to recover the key step by step. Second, through the experiment, this paper proves the effectiveness of the template attack methods proposed in this paper. In addition, this paper proposes a kind of mask level protection method of side channel attack about LBlock algorithm. Experiments show that this method can effectively resist first-order power analysis attack. Then we compared masked and unmasked LBlock algorithm with respect to three indicators: program file size, storage and encryption time. The results show that these three indicators are in a reasonable range.
关明扬, 于国瑞, 向贻锡, 谈兆年, 张国双, 王安. 针对LBlock算法BBC编码方式的功耗分析与防护[J]. 密码学报, 2017, 4(3): 218-228.
GUAN M Y, YU G R, XIANG Y X, TAN Z N, ZHANG G S, WANG A. Power Analysis and Protection on BBC encoding LBlock Decryption Algorithm. Journal of Cryptologic Research, 2017, 4(3): 218-228.
\bibitem{1} WU W, ZHANG L. LBlock: a lightweight block cipher[C]. In: Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2011: 327–344.
\bibitem{2} BOGDANOV A, KNUDSEN L R, LEANDER G, et al. PRESENT: An ultra-lightweight block cipher[C]. In: Cryptographic Hardware and Embedded Systems—CHES 2007. Springer Berlin Heidelberg, 2007: 450–466.
\bibitem{3} HUANG Y H, GUO J S, LUO W. Related-key impossible differential attacks on Lblock[J]. Chinese Journal of Electronics, 2015(10): 1948–1953.
\bibitem{4} ZHAN Y J, GUAN J, DING L, et al. Related-key impossible differential attack on reduced round LBlock[J]. Journal of Electronics \& Information Technology, 2012(9): 2161–2166.
\bibitem{5} LUO F, ZHOU X G, OU Q Y. Cryptanalysis of the LBlock using multiple zero-correlation linear approximations[J]. Journal of Xidian University(Natural Science), 2014(5): 173–179.
\bibitem{6} XUE H, ZHAO X J, WANG X J. Algebraic side-channel attack on LBlock[J]. Journal of Huazhong University of Science \& Technology, 2013, 41(6): 56–59.
\bibitem{7} ZHAO L, NISHIDE T, SAKURAI K. Differential fault analysis of full LBlock[J]. Constructive Side-Channel Analysis and Secure Design, 2012: 135–150.
\bibitem{8} ISLAM S, AFZAL M, RASHDI A. On the security of LBlock against the cube attack and side channel cube attack[C]. In: International Conference on Availability, Reliability, and Security. Springer, Berlin, Heidelberg, 2013: 105–121.
\bibitem{9} HAN Y, ZHOU Y, LIU J. Securing lightweight block cipher against power analysis attacks[J]. Future Wireless Networks and Information Systems, 2012, 143: 379–390.
\bibitem{10} KOCHER P, JAFFE J, JUN B. Differential power analysis[C]. In: Advances in Cryptology—CRYPTO 1999. Springer Berlin Herdelberg, 1999: 388–397.
\bibitem{11} SERVANT V, DEBANDE N, MAGHREBI H, et al. Study of a novel software constant weight implementation[C]. In: International Conference on Smart Card Research and Advanced Applications. Springer, Cham, 2014: 35–48.
\bibitem{12} CHEN C, EISENBARTH T, SHAHVERDI A, et al. Balanced encoding to mitigate power analysis: a case study[C]. In: International Conference on Smart Card Research and Advanced Applications. Springer International Publishing, 2014: 49–63.