Combination of Side-Channel and Collision Attacks to Reveal the Secrets of Gate Masked Implementations
Publish place: 4th Iranian Security Community Conference
Publish Year: 1386
Type: Conference paper
Language: English
View: 2,486
This Paper With 8 Page And PDF Format Ready To Download
- Certificate
- I'm the author of the paper
Export:
Document National Code:
ISCC04_039
Index date: 1 March 2007
Combination of Side-Channel and Collision Attacks to Reveal the Secrets of Gate Masked Implementations abstract
new class of collision attacks which uses side channel analysis has been introduced by Schramm et al. in 2004. They targeted an 8051 based microcontroller running AES in software. They deduced that a pair of plaintexts which lead to the same partial intermediate values is distinguished by examining the similarity of their power consumption traces. This contribution combines collision attacks and simple power analysis to detect a plaintext whose intermediate result includes some identical partial values. In this article, our target is ASIC and FPGA implementations of cryptographic algorithms because the designers of such devices have to share the resources due to the area constrain. In fact, our proposed attack is based on the concept that the power consumption of a CMOS device has a significant minimum if two consecutive values which are loaded in a register are the same. First, we show that key dependent collisions could occur in most registers of cryptographic hardwares. It is shown that how these collisions can be detected by investigating the power consumption traces. The proposed attack decreases the number of candidates for the secret key. For instance, 2128 candidates in a particular implementation of AES-128 encryption are decreased to 28. Furthermore, it is shown how this attack works in the presence of the gate masking, and how the masking at the gate level affects the size of the key candidate space. Finally, a trade off between the success rate of this attack and the number of mask bits is illustrated. Although the proposed attack is generally not restricted to a particular cryptographic algorithm, AES-128 encryption algorithm is considered for the examples shown.
Combination of Side-Channel and Collision Attacks to Reveal the Secrets of Gate Masked Implementations Keywords:
Combination of Side-Channel and Collision Attacks to Reveal the Secrets of Gate Masked Implementations authors
Amir Moradi
Department of Computer Engineering
Mahmoud Salmasizadeh
Electronic Research Center, Sharif University of Technology, Tehran, Iran
Mohammad Manzuri Shalmani
Department of Computer Engineering Department of Computer Engineering
مراجع و منابع این Paper:
لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :