Algebraic Side-Channel Analysis in the Presence of Errors

被引:0
|
作者
Oren, Yossef [1 ]
Kirschbaum, Mario [2 ]
Popp, Thomas [2 ]
Wool, Avishai [1 ]
机构
[1] Tel Aviv Univ, Comp & Network Secur Lab, Sch Elect Engn, IL-69978 Ramat Aviv, Israel
[2] Graz Univ Technol, Inst Appl Informat Proc & Commun, A-8010 Graz, Austria
基金
奥地利科学基金会;
关键词
Algebraic attacks; power analysis; side-channel attacks; pseudo-Boolean optimization; POWER-ANALYSIS; ATTACKS; AES;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Measurement errors make power analysis attacks difficult to mount when only a single power trace is available: the statistical methods that make DPA attacks so successful are not applicable since they require many (typically thousands) of traces. Recently it was suggested by [18] to use algebraic methods for the single-trace scenario, converting the key recovery problem into a Boolean satisfiability (SAT) problem, then using a SAT solver. However, this approach is extremely sensitive to noise (allowing an error rate of well under 1% at most), and the question of its practicality remained open. In this work we show how a single-trace side-channel analysis problem can be transformed into a pseudo-Boolean optimization (PBOPT) problem, which takes errors into consideration. The PBOPT instance can then be solved using a suitable optimization problem solver. The PBOPT syntax provides for a more expressive input specification which allows a very natural representation of measurement errors. Most importantly, we show that using our approach we are able to mount successful and efficient single-trace attacks even in the presence of realistic error rates of 10%-20%. We call our new attack methodology Tolerant Algebraic Side-Channel Analysis (TASCA). We show practical attacks on two real ciphers: Keeloq and AES.
引用
收藏
页码:428 / +
页数:3
相关论文
共 50 条
  • [1] Algebraic Side-Channel Attacks
    Renauld, Mathieu
    Standaert, Francois-Xavier
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 393 - 410
  • [2] Improved algebraic side-channel attack on AES
    Mohamed, Mohamed Saied Emam
    Bulygin, Stanislav
    Zohner, Michael
    Heuser, Annelie
    Walter, Michael
    Buchmann, Johannes
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (03) : 139 - 156
  • [3] Practical Algebraic Side-Channel Attacks Against ACORN
    Adomnicai, Alexandre
    Masson, Laurent
    Fournier, Jacques J. A.
    [J]. INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 325 - 340
  • [4] Algebraic side-channel attacks on Trivium stream cipher
    Sun, Wenlong
    Guan, Jie
    [J]. IET COMMUNICATIONS, 2024,
  • [5] Side-Channel Analysis of Keymill
    Dobraunig, Christoph
    Eichlseder, Maria
    Korak, Thomas
    Mendel, Florian
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2017, 10348 : 138 - 152
  • [6] On XTR and side-channel analysis
    Page, Daniel
    Stam, Martijn
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3357 : 54 - 68
  • [7] On XTR and side-channel analysis
    Page, D
    Stam, M
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 54 - 68
  • [8] A Complete Tolerant Algebraic Side-Channel Attack for AES with CP
    Liu, Fanghui
    Cruz, Waldemar
    Michel, Laurent
    [J]. PRINCIPLES AND PRACTICE OF CONSTRAINT PROGRAMMING, 2018, 11008 : 259 - 275
  • [9] A Tolerant Algebraic Side-Channel Attack on AES Using CP
    Liu, Fanghui
    Cruz, Waldemar
    Ma, Chujiao
    Johnson, Greg
    Michel, Laurent
    [J]. PRINCIPLES AND PRACTICE OF CONSTRAINT PROGRAMMING (CP 2017), 2017, 10416 : 189 - 205
  • [10] Federated Learning in Side-Channel Analysis
    Wang, Huanyu
    Dubrova, Elena
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2020, 2021, 12593 : 257 - 272