Abstract
This work presents a novel algorithm to quantify the relation between three factors that characterize a side channel adversary: the amount of observed side channel leakage, the workload of full key recovery, and its achievable success rate. The proposed algorithm can be used by security evaluators to derive a realistic bound on the capabilities of a side channel adversary. Furthermore, it provides an optimal strategy for combining subkey guesses to achieve any predefined success rate. Hence, it can be used by a side channel adversary to determine whether observed leakage suffices for key recovery before expending computation time. The algorithm is applied to a series of side channel measurements of a microcontroller AES implementation and simulations. A comparison to related work shows that the new algorithm improves on existing algorithms in several respects.
| Original language | English |
|---|---|
| Title of host publication | Smart Card Research and Advanced Applications |
| Editors | Marc Joye, Amir Moradi |
| Number of pages | 18 |
| Volume | 8968 |
| Place of Publication | Cham |
| Publisher | Springer International Publishing |
| Publication date | 17.03.2015 |
| Pages | 215-232 |
| ISBN (Print) | 978-3-319-16762-6 |
| ISBN (Electronic) | 978-3-319-16763-3 |
| DOIs | |
| Publication status | Published - 17.03.2015 |
| Event | 13th International Conference on Smart Card Research and Advanced Applications - Paris, France Duration: 05.11.2014 → 07.11.2014 |