Toward reverse engineering on secret S-boxes in block ciphers
It has been widely accepted that the security cryptosystems should be only dependent on the security of their secret keys. However, there are still secret ciphers with unknown components in their commercial applications due to various reasons. The existing reverse engineering analyzes are developed for analyzing specific ciphers, and cannot cope with secret algorithms with different structures. By looking into the common characteristics of the secret algorithms of ciphers implemented with unknown S-boxes, we proposed a novel reverse engineering analysis approach referred to as Signed Reverse Engineering based on Differential Power Analysis (SREDPA). It is a generic reverse engineering analysis and can recover the parameters of the secret S-boxes of the block ciphers in typical structures such as SPN, Feistel, and XFeistel (eXtended Feistel). By identifying the bias of the differential power analysis (DPA) traces, we build the theoretical model of SREDPA and prove its effectiveness. Experiments are performed on secret algorithms in different structures and further validate our SREDPA experimentally. The complexity of SREDPA only relies on the size of S-boxes and the reverse engineering analysis is efficient. As shown in the theoretical analysis and the conducted experiments, our SREDPA approach is readily to be extended for analyzing other secret ciphers with unknown S-boxes. This renders a new challenge on the design and implementation of secret ciphers. 2014 Science China Press and Springer-Verlag Berlin Heidelberg.
Please refer to publisher version or contact your library.