Correlation Power Analysis of KASUMI and Power Resilience Analysis of Some Equivalence Classes of KASUMI S-Boxes

  • PDF / 5,384,244 Bytes
  • 17 Pages / 595.224 x 790.955 pts Page_size
  • 48 Downloads / 168 Views

DOWNLOAD

REPORT


Correlation Power Analysis of KASUMI and Power Resilience Analysis of Some Equivalence Classes of KASUMI S-Boxes Devansh Gupta1 · Somanath Tripathy1 · Bodhisatwa Mazumdar2 Received: 16 May 2020 / Accepted: 21 August 2020 © Springer Nature Switzerland AG 2020

Abstract The KASUMI block cipher imparts confidentiality and integrity to the 3G mobile communication systems. In this paper, we present power analysis attack on KASUMI as a two-pronged attack: first, the F L function is targeted, and subsequently the recovered output of F L function is used to mount attack on 7 × 7 and 9 × 9 S-boxes embedded in the F O function of the cipher. Our attack recovers all 128 bits of the secret key of KASUMI. Furthermore, we present a countermeasure for this attack which requires lesser resource footprint as compared with existing countermeasures, rendering such implementations practically feasible for resource-constrained applications, such as IoT and RFID devices. In addition, we propose linear equivalent mappings and Permutation-XOR equivalent mappings of 7 × 7 S-boxes which have stronger resilience against power analysis attacks with respect to the improved transparency order and confusion coefficient parameters while restoring the classical cryptographic properties. We point out some properties of linear equivalence (LE) classes of these S-boxes with respect to these metrics as well. Keywords Correlation power analysis · KASUMI · Countermeasure · S-boxes · Linear equivalence · Permutation XOR equivalence

1 Introduction Mobile phones are very popular nowadays and have become a crucial part of our everyday life. In some applications, they complement traditional computing devices, such as laptops. Due to this massive popularity of mobile devices, security in mobile communication is very important. In this respect, the 3rd-generation partnership project (3GPP)based technologies have been constantly evolving through generations of commercial cellular or mobile systems. Since the completion of long-term evolution (LTE), 3GPP has become focal point for mobile systems beyond 3G.

 Bodhisatwa Mazumdar

[email protected] Devansh Gupta [email protected] Somanath Tripathy [email protected] 1

Indian Institute of Technology Patna, Patna, 801106, India

2

Indian Institute of Technology Indore, Indore, India

To ensure data confidentiality and data integrity of the users in 3GPP technology [28], a 64-bit block cipher called KASUMI [9]is used. Therefore, security of a 3GPPbased mobile network depends on the security of the underlying KASUMI block cipher. Furthermore, security of GSM (Global System for Mobile Communications) and the second-generation (2G) mobile cellular system relies on A5/3 is also based on KASUMI block cipher. In existing literature, the modes of operation in KASUMI is provably secure if KASUMI is a pseudorandom permutation (PRP) and it is also secured in differentialbased related key attacks [13]. Meanwhile, an impossible differential attack [7] and a related key differential attack was performed on a 6-round ver