Error-tolerant algebraic side-channel attacks using BEE

0Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.

Abstract

Algebraic side-channel attacks are a type of side-channel analysis which can recover the secret information with a small number of samples (e. g., power traces). However, this type of side-channel analysis is sensitive to measurement errors which may make the attacks fail. In this paper, we propose a new method of algebraic side-channel attacks which considers noisy leakages as integers restricted to intervals and finds out the secret information with the help of a constraint programming compiler named BEE. To demonstrate the efficiency of this new method in algebraic side-channel attacks, we analyze some popular implementations of block ciphers—PRESENT, AES, and SIMON under the Hamming weight or Hamming distance leakage model. For AES, our method requires the least leakages compared with existing works under the same error model. For both PRESENT and SIMON, we provide the first analytical results of them under algebraic side-channel attacks in the presence of errors. To further demonstrate the wide applicability of this new method, we also extend it to cold boot attacks. In the cold boot attacks against AES, our method increases the success rate by over 25% than previous works.

Cite

CITATION STYLE

APA

Song, L., Hu, L., Sun, S., Zhang, Z., Shi, D., & Hao, R. (2015). Error-tolerant algebraic side-channel attacks using BEE. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8958, pp. 1–15). Springer Verlag. https://doi.org/10.1007/978-3-319-21966-0_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free