Attacking state-of-the-art software countermeasures-A case study for AES

42Citations
Citations of this article
50Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In order to protect software implementations of secret-key cryptographic primitives against side channel attacks, a software developer has only a limited choice of countermeasures. A combination of masking and randomization of operations in time promises good protection and can be realized without too much overhead. Recently, new advanced DPA methods have been proposed to attack software implementations with such kind of protection. In this work, we have applied these methods successfully to break a protected AES software implementation on a programmable smart card. Thus, we were able to verify the practicality of the new attacks and to estimate their effectiveness in comparison to traditional DPA attacks on unprotected implementations. In the course of our work, we have also refined and improved the original attacks, so that they can be mounted more efficiently. Our practical results indicate that the effort required for attacking the protected implementation with the examined methods is more than two orders of magnitude higher compared to an attack on an unprotected implementation. © 2008 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Tillich, S., & Herbst, C. (2008). Attacking state-of-the-art software countermeasures-A case study for AES. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5154 LNCS, pp. 228–243). https://doi.org/10.1007/978-3-540-85053-3_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free