International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Pincering SKINNY by Exploiting Slow Diffusion: Enhancing Differential Power Analysis with Cluster Graph Inference

Authors:
Nicolas Costes , Simula UiB, Bergen, Norway
Martijn Stam , Simula UiB, Bergen, Norway
Download:
DOI: 10.46586/tches.v2023.i4.460-492
URL: https://tches.iacr.org/index.php/TCHES/article/view/11173
Search ePrint
Search Google
Abstract: Lightweight cryptography is an emerging field where designers are testing the limits of symmetric cryptography. We investigate the resistance against sidechannel attacks of a new class of lighter blockciphers, which use a classic substitution–permutation network with slow diffusion and many rounds.Among these ciphers, we focus on SKINNY, a primitive used up to the final round ofNIST’s recent lightweight standardisation effort. We show that the lack of diffusion in the key scheduler allows an attacker to combine leakage from the first and the last rounds, effectively pincering its target. Furthermore, the slow diffusion used by its partial key-absorption and linear layers enable, on both sides, to target S-Boxes from several rounds deep.As some of these S-boxes leak on the same part of the key, full key recovery exploiting all leakage requires a clever combining strategy. We introduce the use of cluster graph inference (an established tool from probabilistic graphical model theory) to enhance both unprofiled or profiled differential power analysis, enabling us to handlethe increase of S-Boxes with their intertwined leakage.We evaluate the strength of our attack both in the Hamming weight model and against two implementations running on an STM32F303 ARM Cortex-M4 hosted on a ChipWhisperer target board, showing that our attack reduces the number of traces required to attack SKINNY by a factor of around 2.75.
BibTeX
@article{tches-2023-33355,
  title={Pincering SKINNY by Exploiting Slow Diffusion: Enhancing Differential Power Analysis with Cluster Graph Inference},
  journal={IACR Transactions on Cryptographic Hardware and Embedded Systems},
  publisher={Ruhr-Universität Bochum},
  volume={2023, Issue 4},
  pages={460-492},
  url={https://tches.iacr.org/index.php/TCHES/article/view/11173},
  doi={10.46586/tches.v2023.i4.460-492},
  author={Nicolas Costes and Martijn Stam},
  year=2023
}