AES-CBC 모드에 대한 CPA 및 딥러닝 기반 IV 분석 방안

Vol. 34, No. 5, pp. 833-840, 10월. 2024
10.13089/JKIISC.2024.34.5.833, Full Text:
Keywords: Side-Channel Attack, Correlation Power Analysis, Deep Learning, Template Attack, AES-CBC
Abstract

Existing side-channel analysis studies have mostly been analyzed only on block ciphers without considering the operation mode. However, establishing a methodology of side-channel analysis on operation mode is necessary because information for performing analysis varies depending on that. This paper proposes a methodology of correlation power analysis (CPA) on an operation mode CBC in a software target. The first round SubBytes layer output is generally used as a sensitive hypothetical intermediate value of an encryption algorithm AES (advanced encryption standard); however, the adversary should acquire the plaintext and ciphertext to calculate the input of AES in CBC mode. We propose an intermediate value calculated only by ciphertext. Besides, the initial vector (IV) could be treated as closed information in practice, although it is theoretically not secret. The adversary cannot decrypt the first block of plaintext without IV even if he analyzes the secret key. We propose a deep learning-based IV analysis method in a non-profiled environment.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
노혜빈, 한동국, 김주환, 안성현, 서창배, 류한얼, "CPA and Deep Learning-Based IV Analysis on AES-CBC Mode," Journal of The Korea Institute of Information Security and Cryptology, vol. 34, no. 5, pp. 833-840, 2024. DOI: 10.13089/JKIISC.2024.34.5.833.

[ACM Style]
노혜빈, 한동국, 김주환, 안성현, 서창배, and 류한얼. 2024. CPA and Deep Learning-Based IV Analysis on AES-CBC Mode. Journal of The Korea Institute of Information Security and Cryptology, 34, 5, (2024), 833-840. DOI: 10.13089/JKIISC.2024.34.5.833.