Abstract
Until now in cryptography the term collision was mainly associated with the surjective mapping of different inputs to an equal output of a hash function. Previous collision attacks were only able to detect collisions at the output of a particular function. In this publication we introduce a new class of attacks which originates from Hans Dobbertin and is based on the fact that side channel analysis can be used to detect internal collisions. We applied our attack against the widely used Data Encryption Standard (DES). We exploit the fact that internal collisions can be caused in three adjacent S-Boxes of DES [DDQ84] in order to gain information about the secret key-bits. As result, we were able to exploit an internal collision with a minimum of 140 encryptions1 yielding 10.2 key-bits. Moreover, we successfully applied the attack to a smart card processor. © International Association for Cryptologic Research 2003.
Author supplied keywords
Cite
CITATION STYLE
Schramm, K., Wollinger, T., & Paar, C. (2003). A new class of collision attacks and its application to DES. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2887, 206–222. https://doi.org/10.1007/978-3-540-39887-5_16
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.