Paper 2012/084

Improved Algebraic Side-Channel Attack on AES

Mohamed Saied Emam Mohamed, Stanislav Bulygin, Michael Zohner, Annelie Heuser, and Michael Walter

Abstract

In this paper we present improvements of the algebraic side- channel analysis of the Advanced Encryption Standard (AES) proposed in [9]. In particular, we optimize the algebraic representation of AES and the algebraic representation of the obtained side-channel information in order to speed up the attack and increase the success rate. We study the performance of our improvements in both known and unknown plain-text/ciphertext attack scenarios. Our experiments indicate that in both cases the amount of required side-channel information is less than the one required in the attacks introduced in [9]. Furthermore, we introduce a method for error handling, which allows our improved algebraic side-channel attack to escape the assumption of an error-free measurement and thus become applicable in practice. We demonstrate the practical use of our improved algebraic side-channel attack by inserting predictions from a single-trace template attack.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Unknown where it was published
Keywords
Algebraic Side-Channel AttackAESError ToleranceIASCA
Contact author(s)
mohamed @ cdc informatik tu-darmstadt de
History
2012-04-16: last of 3 revisions
2012-02-23: received
See all versions
Short URL
https://ia.cr/2012/084
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/084,
      author = {Mohamed Saied Emam Mohamed and Stanislav Bulygin and Michael Zohner and Annelie Heuser and Michael Walter},
      title = {Improved Algebraic Side-Channel Attack on AES},
      howpublished = {Cryptology ePrint Archive, Paper 2012/084},
      year = {2012},
      note = {\url{https://eprint.iacr.org/2012/084}},
      url = {https://eprint.iacr.org/2012/084}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.