On the power of fault sensitivity analysis and collision side-channel attacks in a combined setting

65Citations
Citations of this article
54Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

At CHES 2010 two powerful new attacks were presented, namely the Fault Sensitivity Analysis and the Correlation Collision Attack. This paper shows how these ideas can be combined to create even stronger attacks. Two solutions are presented; both extract leakage information by the fault sensitivity analysis method while each one applies a slightly different collision attack to deduce the secret information without the need of any hypothetical leakage model. Having a similar fault injection method, one attack utilizes the non-uniform distribution of faulty ciphertext bytes while the other one exploits the data-dependent timing characteristics of the target combination circuit. The results when attacking several AES ASIC cores of the SASEBO LSI chips in different process technologies are presented. Successfully breaking the cores protected against DPA attacks using either gate-level countermeasures or logic styles indicates the strength of the attacks. © 2011 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Moradi, A., Mischke, O., Paar, C., Li, Y., Ohta, K., & Sakiyama, K. (2011). On the power of fault sensitivity analysis and collision side-channel attacks in a combined setting. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6917 LNCS, pp. 292–311). https://doi.org/10.1007/978-3-642-23951-9_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free