Templates as master keys

39Citations
Citations of this article
65Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We introduce two new attacks: the single-bit template attack and the template-enhanced DPA attack. The single-bit template attack can be used very effectively to classify even single bits in a single side channel sample with a high probability of correctness. The template-enhanced DPA attack, combines traditional DPA with single-bit template attacks to show that if an adversary has access to a test card with even a slightly biased RNG, then he/she can break protected cryptographic implementations on a target card even if they have perfect RNGs. In support of our claim, we report results from experiments on breaking two implementations of DES and AES protected by the masking countermeasure running on smartcards of different manufacturers. In light of these results, the threat of template attacks, generally viewed as intrinsically difficult to mount, needs to be reconsidered. © International Association for Cryptologic Research 2005.

Cite

CITATION STYLE

APA

Agrawal, D., Rao, J. R., Rohatgi, P., & Schramm, K. (2005). Templates as master keys. In Lecture Notes in Computer Science (Vol. 3659, pp. 15–29). Springer Verlag. https://doi.org/10.1007/11545262_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free