Sciweavers

CARDIS
2004
Springer

On the Security of the DeKaRT Primitive

13 years 9 months ago
On the Security of the DeKaRT Primitive
DeKaRT primitives are key-dependent reversible circuits presented at CHES 2003. According to the author, the circuits described are suitable for data scrambling but also as building blocks for block ciphers. Data scrambling of internal links and memories on smart card chips is intended for protecting data against probing attacks. In this paper, we analyze the DeKaRT primitive using linear cryptanalysis. We show that despite its key-dependent behavior, DeKaRT still has strongly linear structures, that can be exploited even under the particular hypothesis that only one bit of the ciphertexts is available to the attacker (as it is the case in the context of probing attacks), and using very few plaintext-ciphertext pairs. The attack methodology we describe could be applied to other data scrambling primitives exhibiting highly biased linear relations.
Gilles Piret, François-Xavier Standaert, Ga
Added 01 Jul 2010
Updated 01 Jul 2010
Type Conference
Year 2004
Where CARDIS
Authors Gilles Piret, François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater
Comments (0)