Reinforcement-Based Divide-and-Conquer Strategy for Side-Channel Attacks

被引:0
|
作者
Jin, Shan [1 ]
Bettati, Riccardo [1 ]
机构
[1] Texas A&M Univ, College Stn, TX 77843 USA
关键词
EFFICIENT;
D O I
10.1109/WIFS49906.2020.9360908
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Previous works have proven that power consumption side-channel attacks, such as the Template Attack and the Stochastic Model, are effective for small secrets, such as those with 8 or 16 bits. However, directly applying those side-channel attacks on systems with large secrets, for example AES 128, is computationally intractable. Attackers usually apply a divide-and-conquer strategy to partition the secret in order to scale to larger numbers of bits. In the case of AES, divide-and-conquer strategy based side-channel attacks are usually launched on either the first round or the last round of the AES encryption. In this paper, we propose an efficient and pragmatic attack strategy that exploits the samples from multiple rounds, which significantly improves the key recovery compared to standard divide-and-conquer strategies.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Efficient side-channel attacks beyond divide-and-conquer strategy
    Jin, Shan
    Bettati, Riccardo
    [J]. COMPUTER NETWORKS, 2021, 198 (198)
  • [2] A Scalable Parallel Reinforcement Learning Method Based on Divide-and-Conquer Strategy
    Yang Xudong
    Liu Quan
    Jing Ling
    Li Jin
    Yang Kai
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2013, 22 (02) : 242 - 246
  • [3] A scalable parallel reinforcement learning method based on divide-and-conquer strategy
    [J]. Yang, X. (yangxudong-suda@gmail.com), 1600, Chinese Institute of Electronics (22):
  • [4] A divide-and-conquer strategy for thwarting distributed denial-of-service attacks
    Chen, Ruiliang
    Park, Jung-Min
    Marchany, Randolph
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2007, 18 (05) : 577 - 588
  • [5] DESIGN OF COMBINERS TO PREVENT DIVIDE-AND-CONQUER ATTACKS
    SIEGENTHALER, T
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 273 - 279
  • [6] High Utility Itemsets Mining Based on Divide-and-Conquer Strategy
    Jiyong Liao
    Sheng Wu
    Ailian Liu
    [J]. Wireless Personal Communications, 2021, 116 : 1639 - 1657
  • [7] High Utility Itemsets Mining Based on Divide-and-Conquer Strategy
    Liao, Jiyong
    Wu, Sheng
    Liu, Ailian
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (03) : 1639 - 1657
  • [8] Petal segmentation in CT images based on divide-and-conquer strategy
    Naka, Yuki
    Utsumi, Yuzuko
    Iwamura, Masakazu
    Tsukaya, Hirokazu
    Kise, Koichi
    [J]. FRONTIERS IN PLANT SCIENCE, 2024, 15
  • [9] Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods
    Liu, Fukang
    Isobe, Takanori
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2019, 2019, 11689 : 306 - 326
  • [10] Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods
    Liu, Fukang
    Isobe, Takanori
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (11) : 1260 - 1273