Multiple-differential side-channel collision attacks on AES

被引:0
|
作者
Bogdanov, Andrey [1 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
关键词
side-channel attacks; collision detection; muiltiple-differential; collision attacks; AES; DPA;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, two efficient multiple-differential methods to detect collisions in the presence of strong noise are proposed - binary and ternary voting. After collisions, have been detected, the cryptographic key can be recovered from these collisions using such recent cryptanalytic techniques as linear [1] and algebraic [2] collision attacks. We refer to this combination of the collision detection methods and cryptanalytic techniques as multiple-differential collision attacks (MDCA). When applied to AES, MDCA using binary voting without profiling requires about 2.7 to 13.2 times less traces than the Hamming-weight based CPA for the same implementation. MDCA oil AES using ternary voting with profiling and linear key recovery clearly outperforms CPA by requiring only about 6 online measurements for the range of noise amplitudes where CPA requires from 163 to 6912 measurements. These over, neither key nor attacks do not need the S-box to be known. Moreover, neither key nor plaintext have to he known to the attacker in the profiling stage.
引用
下载
收藏
页码:30 / 44
页数:15
相关论文
共 50 条
  • [31] Side-Channel Attacks on Cryptographic Software
    Lawson, Nate
    IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68
  • [32] Soft Analytical Side-Channel Attacks
    Veyrat-Charvillon, Nicolas
    Gerard, Benoit
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 282 - 296
  • [33] Cache Side-Channel Attacks and Defenses
    Zhang W.
    Bai L.
    Ling Y.
    Lan X.
    Jia X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222
  • [34] Side-Channel Attacks: A Short Tour
    Piessens, Frank
    van Oorschot, Paul C.
    Piessens, Frank
    van Oorshot, Paul C.
    IEEE SECURITY & PRIVACY, 2024, 22 (02) : 75 - 80
  • [35] Improved algebraic side-channel attack on AES
    Mohamed, Mohamed Saied Emam
    Bulygin, Stanislav
    Zohner, Michael
    Heuser, Annelie
    Walter, Michael
    Buchmann, Johannes
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (03) : 139 - 156
  • [36] Automated design of cryptographic devices resistant to multiple side-channel attacks
    Kulikowski, Konrad
    Smirnov, Alexander
    Taubin, Alexander
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 399 - 413
  • [37] Group Verification Based Multiple-Differential Collision Attack
    Ou, Changhai
    Wang, Zhu
    Sun, Degang
    Zhou, Xinping
    Ai, Juan
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016, 2016, 9977 : 145 - 156
  • [38] Deep Learning Side-Channel Attacks against Lightweight SCA Countermeasure RSM-AES
    Fukuda, Yuta
    Yoshida, Kota
    Hashimoto, Hisashi
    Fujino, Takeshi
    PROCEEDINGS OF THE 2021 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2021,
  • [39] A gradient deconvolutional network for side-channel attacks
    Li, Yanbin
    Huang, Yuxin
    Jia, Fuwei
    Zhao, Qingsong
    Tang, Ming
    Ren, Shougang
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 98
  • [40] Remote Side-Channel Attacks on Anonymous Transactions
    Tramer, Florian
    Boneh, Dan
    Paterson, Kenneth G.
    PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 2739 - 2756