Paper 2010/297

Correlation-Enhanced Power Analysis Collision Attack

Amir Moradi, Oliver Mischke, and Thomas Eisenbarth

Abstract

Side-channel based collision attacks are a mostly disregarded alternative to DPA for analyzing unprotected implementations. The advent of strong countermeasures, such as masking, has made further research in collision attacks seemingly in vain. In this work, we show that the principles of collision attacks can be adapted to efficiently break some masked hardware implementation of the AES which still have first-order leakage. The proposed attack breaks an AES implementation based on the corrected version of the masked S-box of Canright and Batina presented at ACNS 2008 which is supposed to be resistant against firstorder attacks. It requires only six times the number of traces necessary for breaking a comparable unprotected implementation. At the same time, the presented attack has minimal requirements on the abilities and knowledge of an adversary. The attack requires no detailed knowledge about the design, nor does it require a training phase.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. CHES 2010
Keywords
Side Channel AnalysisCollision AttackDPAMaskingAESHardware Implementation
Contact author(s)
moradi @ crypto rub de
History
2010-07-29: revised
2010-05-25: received
See all versions
Short URL
https://ia.cr/2010/297
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2010/297,
      author = {Amir Moradi and Oliver Mischke and Thomas Eisenbarth},
      title = {Correlation-Enhanced Power Analysis Collision Attack},
      howpublished = {Cryptology ePrint Archive, Paper 2010/297},
      year = {2010},
      note = {\url{https://eprint.iacr.org/2010/297}},
      url = {https://eprint.iacr.org/2010/297}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.