[Resource Topic] 2016/1143: Ciphertext and Plaintext Leakage Reveals the Entire TDES Key

Welcome to the resource topic for 2016/1143

Ciphertext and Plaintext Leakage Reveals the Entire TDES Key

Authors: Yongbo Hu, Chen Zhang, Yeyang Zheng, Mathias Wagner


SCA(Side-channel analysis) is a well-known method to recover the sensitive data stored in security products. Meanwhile numerous countermeasures for hardware implementation of cryptographic algorithms are proposed to protect the internal data against this attack fortunately. However, some designs are not aware that the protection of the plaintext and ciphertext is also crucial. In this work, we attack an implementation TDES(triple DES) by taking advantage of such leakages detected in a widely used commercial product which is based on the hardware platform that passed the EAL5+ certification. In particular, we guess entire DES keys to construct hypotheses for the intermediate outputs in a TDES calculation. The time cost for this approach is nearly \frac{1}{2^{32}} of that by a brute force. Furthermore, if in addition leakage about the key becomes available, the attack costs become practical. That is, reducing the key entropy of every DES key to 2^{28} allows an enumeration of the entire TDES in 21.6 hours.

ePrint: https://eprint.iacr.org/2016/1143

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .