LIP6 CNRS Sorbonne Université Tremplin Carnot Interfaces
Direct Link LIP6 » أحـداث السـاعـة » مسجلون في الدكتوراه

GOYET Christopher

دكـتور
وحـدة : PolSys
تاريـخ المـغادرة : 30/11/2012
رئاسـة البـحث : Jean-Charles FAUGÈRE
تأطـير مـشـترك : RENAULT Guénaël

Algebraic Side Channel Analysis

Algebraic cryptanalysis is a technique consisting in modeling a cryptographic primitive with a system of multivariate polynomial equations whose solutions give the secret key. The goal of this thesis is to evaluate how external information can significantly speed up the resolution. We assume that external information is obtained by side channel, i.e. by physical measures, or by an anomalous behavior caused by active attacks with fault injection or even by the presence of malware.
Applied to asymmetric cryptography, this work led to the publication of a new attack against DSA-like signature schemes. Inspired by implicit factorization of May and Ritzenhofen, this new attack requires that the ephemeral keys used to sign several messages share a given number of bits without necessarily knowing the value of the shared bits. As an example of our results, only 4 LSBs shared on each ephemeral keys of 100 signed messages are enough to make a never-failing attack and that with 32 LSBs shared, the method needs only 8 signed messages.
On the other hand, with regard to the block ciphers, we present a theoretical study of "Algebraic Side Channel Attacks" (ASCA) in order to explain the effectiveness of the algebraic phase of these attacks and then we deduce theoretical conditions for resistance. We mainly use Gröbner basis method for the solving step rather than SAT solver to control the complexity of this attack. Then we show that the complexity of the Gröbner basis computation in these attacks depends on a new notion of algebraic immunity and the distribution of information leakage.
Finally, we extend the ASCA by considering various leakage models and by studying the influence of these models on the effectiveness of the solving step.
مناقـشـة مـذكـرة : 07/11/2012 - 14h30 - Site Jussieu 25-26/105
أعـضاء لجنة المناقـشة :
Aline GOUGET (Expert Cryptographie, Gemalto) [Rapporteur]
François-Xavier STANDAERT (Professeur, Université catholique de Louvain) [Rapporteur]
Jean-Claude BAJARD (Professeur, Université Pierre et Marie Curie)
Claude CARLET (Professeur, Université Paris 8)
Jean-Charles FAUGÈRE (Directeur de Recherche INRIA, Centre Paris-Rocquencourt)
Guénaël RENAULT (Maître de Conférences, Université Pierre et Marie Curie)
Olivier ORCIÈRE (Expert en cryptographie, Thales communications & security)

إصدارات 2011-2012

  • 2012
    • C. Carlet, J.‑Ch. Faugère, Ch. Goyet, G. Renault : “Analysis of the Algebraic Side Channel Attack”, Journal of Cryptographic Engineering, vol. 2 (1), pp. 45-62, (Springer Berlin / Heidelberg), (ISBN: 2190-8508) (2012)
    • J.‑Ch. Faugère, Ch. Goyet, G. Renault : “Attacking (EC)DSA Given Only an Implicit Hint”, Selected Areas in Cryptography, vol. 7707, Lecture Notes in Computer Science, Windsor, Canada, pp. 252-274, (Springer) (2012)
    • Ch. Goyet : “Cryptanalyse algébrique par canaux auxiliaires”, أطروحة, مناقـشـة مـذكـرة 07/11/2012, رئاسـة البـحث Faugère, Jean-Charles, تأطـير مـشـترك RENAULT Guénaël (2012)
  • 2011
    • J.‑Ch. Faugère, Ch. Goyet, G. Renault : “Algebraic Side Channel Analysis”, COSADE'11: The 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design, Darmstadt, GermanyFraunhofer SIT, pp. 1-6 (2011)
 Mentions légales
| خـريـطـة المـوقـع