On the Security of the DeKaRT Primitive

نویسندگان

  • Gilles Piret
  • François-Xavier Standaert
  • Gaël Rouvroy
  • Jean-Jacques Quisquater
چکیده

DeKaRT primitives are key-dependent reversible circuits presented at CHES 2003. According to the author, the circuits described are suitable for data scrambling but also as building blocks for block ciphers. Data scrambling of internal links and memories on smart card chips is intended for protecting data against probing attacks. In this paper, we analyze the DeKaRT primitive using linear cryptanalysis. We show that despite its key-dependent behavior, DeKaRT still has strongly linear structures, that can be exploited even under the particular hypothesis that only one bit of the ciphertexts is available to the attacker (as it is the case in the context of probing attacks), and using very few plaintext-ciphertext pairs. The attack methodology we describe could be applied to other data scrambling primitives exhibiting highly biased linear relations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations

GGH class of public-key cryptosystems relies on computational problems based on the closest vector problem (CVP) in lattices for their security. The subject of lattice based cryptography is very active and there have recently been new ideas that revolutionized the field. We present EEH, a GGH-Like public key cryptosystem based on the Eisenstein integers Z [ζ3] where ζ3 is a primitive...

متن کامل

Block ciphers : security proofs, cryptanalysis, design, and fault attacks/

Block ciphers are widely used building blocks for secure communication systems; their purpose is to ensure confidentiality of the data exchanged through such systems, while achieving high performance. In this context, a variety of aspects must be taken into account. Primarily, they must be secure. The security of a block cipher is usually assessed by testing its resistance against known attacks...

متن کامل

A Deterministic Multiple Key Space Scheme for Wireless Sensor Networks via Combinatorial Designs

The establishing of a pairwise key between two nodes for encryption in a wireless sensor network is a challenging issue. To do this, we propose a new deterministic key pre-distribution scheme which has modified the multiple key space scheme (MKSS). In the MKSS, the authors define two random parameters to make better resilience than existing schemes. Instead of a random selection of these parame...

متن کامل

A traceable optimistic fair exchange protocol in the standard model

An Optimistic Fair Exchange (OFE) protocol is a good way for two parties to exchange their digital items in a fair way such that at the end of the protocol execution, both of them receive their items or none of them receive anything. In an OFE protocol there is a semi-trusted third party, named arbitrator, which involves in the protocol if it is necessary. But there is a security problem when a...

متن کامل

Peripheral Primitive Neuroectodermal Tumor of the Ovary: The Report of Two Rare Cases

Peripheral primitive neuroectodermal tumor (pPNET) is a highly aggressive small round cell tumor belonging to PNET/Ewing sarcoma family. Ovarian tumors composed of primitive neuroectodermal elements are extremely rare. Herein we reported two cases of peripheral primitive neuroectodermal tumors of ovary in two patients with different clinical presentations. Definite diagnoses were made bas...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004