Paper 2021/817

Give Me 5 Minutes: Attacking ASCAD with a Single Side-Channel Trace

Olivier Bronchain, UCLouvain
Gaëtan Cassiers, UCLouvain
François-Xavier Standaert, UCLouvain
Abstract

In this note, we describe an attack against the ANSSI Side-Channel Analysis Database (ASCAD), which recovers the full key using the leakage of a single masked block cipher execution. The attack uses a new open-source Side-Channel Analysis Library (SCALib), which allows running the leakage profiling and attacking in less than 5 minutes. It exploits well-known techniques, yet improves significantly over the best known attacks against ASCAD. We conclude by questioning the impact of these experimental findings for side-channel security evaluations.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint.
Contact author(s)
olivier bronchain @ uclouvain be
gaetan cassiers @ uclouvain be
fstandae @ uclouvain be
History
2022-06-08: revised
2021-06-16: received
See all versions
Short URL
https://ia.cr/2021/817
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/817,
      author = {Olivier Bronchain and Gaëtan Cassiers and François-Xavier Standaert},
      title = {Give Me 5 Minutes: Attacking ASCAD with a Single Side-Channel Trace},
      howpublished = {Cryptology ePrint Archive, Paper 2021/817},
      year = {2021},
      note = {\url{https://eprint.iacr.org/2021/817}},
      url = {https://eprint.iacr.org/2021/817}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.