Enhancing collision attacks

30Citations
Citations of this article
37Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Side Channel Attacks (SCA) have received a huge interest in the last 5 years. These new methods consider non-cryptographic sources of information (like timing or power consumption) in addition to traditional techniques. Consequently block ciphers must now resist a variety of SCAs, among which figures the class of "collision attacks". This recent technique combines side channel information with tools originally developed for block cipher or hash function cryptanalysis, like differential cryptanalysis for instance. In this paper, we propose techniques to enhance collision attacks. First we describe a general framework for collision attacks against Feistel ciphers that extends and improves on previous results specifically obtained against DES. Then, we describe an improved method to attack DES using "almost collisions". Indeed we observed that taking into account internal states which are abnormally similar results in more efficient attacks. Some experimental results obtained against a DES implementation are finally presented. © International Association for Cryptologic Research 2004.

Cite

CITATION STYLE

APA

Ledig, H., Muller, F., & Valette, F. (2004). Enhancing collision attacks. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3156, 176–190. https://doi.org/10.1007/978-3-540-28632-5_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free