Correlation-Enhanced Power Analysis Collision Attack

Amir Moradi, Oliver Mischke, Thomas Eisenbarth

Abstract

Side-channel based collision attacks are a mostly disregarded alternative to DPA for analyzing unprotected implementations. The advent of strong countermeasures, such as masking, has made further research in collision attacks seemingly in vain. In this work, we show that the principles of collision attacks can be adapted to efficiently break some masked hardware implementation of the AES which still have first-order leakage. The proposed attack breaks an AES implementation based on the corrected version of the masked S-box of Canright and Batina presented at ACNS 2008. The attack requires only six times the number of traces necessary for breaking a comparable unprotected implementation. At the same time, the presented attack has minimal requirements on the abilities and knowledge of an adversary. The attack requires no detailed knowledge about the design, nor does it require a profiling phase.
OriginalspracheEnglisch
TitelCryptographic Hardware and Embedded Systems, CHES 2010
Redakteure/-innenStefan Mangard, François-Xavier Standaert
Seitenumfang15
Band6225
ErscheinungsortBerlin, Heidelberg
Herausgeber (Verlag)Springer Berlin Heidelberg
Erscheinungsdatum08.2010
Seiten125-139
ISBN (Print)978-3-642-15030-2
ISBN (elektronisch)978-3-642-15031-9
DOIs
PublikationsstatusVeröffentlicht - 08.2010
Veranstaltung12 International Workshop on Cryptographic Hardware and Embedded Systems - Santa Barbara, USA / Vereinigte Staaten
Dauer: 17.08.201020.08.2010

Fingerprint

Untersuchen Sie die Forschungsthemen von „Correlation-Enhanced Power Analysis Collision Attack“. Zusammen bilden sie einen einzigartigen Fingerprint.

Zitieren