Multiple-differential side-channel collision attacks on AES

被引:0
|
作者
Bogdanov, Andrey [1 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
来源
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2008, PROCEEDINGS | 2008年 / 5154卷
关键词
side-channel attacks; collision detection; muiltiple-differential; collision attacks; AES; DPA;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, two efficient multiple-differential methods to detect collisions in the presence of strong noise are proposed - binary and ternary voting. After collisions, have been detected, the cryptographic key can be recovered from these collisions using such recent cryptanalytic techniques as linear [1] and algebraic [2] collision attacks. We refer to this combination of the collision detection methods and cryptanalytic techniques as multiple-differential collision attacks (MDCA). When applied to AES, MDCA using binary voting without profiling requires about 2.7 to 13.2 times less traces than the Hamming-weight based CPA for the same implementation. MDCA oil AES using ternary voting with profiling and linear key recovery clearly outperforms CPA by requiring only about 6 online measurements for the range of noise amplitudes where CPA requires from 163 to 6912 measurements. These over, neither key nor attacks do not need the S-box to be known. Moreover, neither key nor plaintext have to he known to the attacker in the profiling stage.
引用
收藏
页码:30 / 44
页数:15
相关论文
共 50 条
  • [11] On the Detection of Side-Channel Attacks
    Vateva-Gurova, Tsvetoslava
    Suri, Neeraj
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 185 - 186
  • [12] Side-Channel Attacks Based on Collaborative Learning
    Liu, Biao
    Ding, Zhao
    Pan, Yang
    Li, Jiali
    Feng, Huamin
    DATA SCIENCE, PT 1, 2017, 727 : 549 - 557
  • [13] Introduction to Side-Channel Attacks and Fault Attacks
    Li, Yang
    Chen, Mengting
    Wang, Jian
    2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2016, : 573 - 575
  • [14] Side-channel Collision Attack Based on Multiple-bits
    Yuan, Ye
    Wu, Liji
    Zhang, Xiangmin
    Yang, Yijun
    PROCEEDINGS OF 2017 11TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2017, : 1 - 5
  • [15] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [16] On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting
    Moradi, Amir
    Mischke, Oliver
    Paar, Christof
    Li, Yang
    Ohta, Kazuo
    Sakiyama, Kazuo
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 292 - +
  • [17] Implementation on MicroBlaze of AES Algorithm to Reveal Fake Keys Against Side-Channel Attacks
    Lumbiarres-Lopez, Ruben
    Lopez-Garcia, Mariano
    Canto-Navarro, Enrique
    2014 IEEE 23RD INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2014, : 1882 - 1887
  • [18] Codes for Side-Channel Attacks and Protections
    Guilley, Sylvain
    Heuser, Annelie
    Rioul, Olivier
    CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 35 - 55
  • [19] DRM to Counter Side-Channel Attacks?
    Benadjila, Ryad
    Billet, Olivier
    Francfort, Stanislas
    DRM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON DIGITAL RIGHTS MANAGEMENT, 2007, : 23 - 32
  • [20] Synthesis of Adaptive Side-Channel Attacks
    Quoc-Sang Phan
    Bang, Lucas
    Pasareanu, Corina S.
    Malacaria, Pasquale
    Bultan, Tevfik
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 328 - 342