Paper 2011/579

Clockwise Collision Analysis -- Overlooked Side-Channel Leakage Inside Your Measurements

Yang Li, Daisuke Nakatsu, Qi Li, Kazuo Ohta, and Kazuo Sakiyama

Abstract

This paper presents a new side-channel attack technique called {\it clockwise collision} analysis. For the cryptographic implementations using synchronous digital circuit with a loop architecture, signal transitions as well as the side-channel leakage relates to not only the input data in the current cycle, but also the status in one-cycle before. The clockwise collision utilizes the fact that little computation is required in the second clock cycle when the inputs for two consecutive clock cycles are the same. In contrast, the previously known {\it computational collision} utilizes the fact that the computation of the same input value leads to similar side-channel leakage. By experimentation, we demonstrate the feasibility and vulnerability for this novel clockwise collision analysis both by injecting faults and by analyzing the power consumption.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Unknown where it was published
Keywords
Side-channel attackclockwise collisionfaultpower consumption
Contact author(s)
liyang @ ice uec ac jp
History
2011-11-02: received
Short URL
https://ia.cr/2011/579
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2011/579,
      author = {Yang Li and Daisuke Nakatsu and Qi Li and Kazuo Ohta and Kazuo Sakiyama},
      title = {Clockwise Collision Analysis -- Overlooked Side-Channel Leakage Inside Your Measurements},
      howpublished = {Cryptology ePrint Archive, Paper 2011/579},
      year = {2011},
      note = {\url{https://eprint.iacr.org/2011/579}},
      url = {https://eprint.iacr.org/2011/579}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.