2010
DOI: 10.1007/978-3-642-15031-9_29
|View full text |Cite
|
Sign up to set email alerts
|

Algebraic Side-Channel Analysis in the Presence of Errors

Abstract: Abstract. Measurement errors make power analysis attacks difficult to mount when only a single power trace is available: the statistical methods that make DPA attacks so successful are not applicable since they require many (typically thousands) of traces. Recently it was suggested by [18] to use algebraic methods for the single-trace scenario, converting the key recovery problem into a Boolean satisfiability (SAT) problem, then using a SAT solver. However, this approach is extremely sensitive to noise (allowi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
38
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(38 citation statements)
references
References 14 publications
0
38
0
Order By: Relevance
“…In fact, the most noticeable exceptions attempting to better exploit computational power in physical attacks are based on advanced techniques, e.g. exploiting the detection of collisions [5,18,31,32], or taking advantage of algebraic cryptanalysis [6,23,27,28], of which the practical relevance remains an open question (because of stronger assumptions). But as again suggested by previous works in statistical cryptanalysis, optimal key ranking procedures would be a more direct approach in order to better trade data and time complexities in "standard" side-channel attacks.…”
Section: Introductionmentioning
confidence: 99%
“…In fact, the most noticeable exceptions attempting to better exploit computational power in physical attacks are based on advanced techniques, e.g. exploiting the detection of collisions [5,18,31,32], or taking advantage of algebraic cryptanalysis [6,23,27,28], of which the practical relevance remains an open question (because of stronger assumptions). But as again suggested by previous works in statistical cryptanalysis, optimal key ranking procedures would be a more direct approach in order to better trade data and time complexities in "standard" side-channel attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Since the traces are captured for entire encryptions, exploiting the cache events in the third and later rounds can improve the efficiency of TDCA. Combining TDCAs with algebraic techniques and conducting algebraic side-channel attacks (ASCA) [14,15,16,17] is a very promising way to improve TDCA. Previous ASCA mainly focused on power based Hamming weight leakage model [14,15,17] or Hamming distance leakage model [16].…”
Section: Introductionmentioning
confidence: 99%
“…Combining TDCAs with algebraic techniques and conducting algebraic side-channel attacks (ASCA) [14,15,16,17] is a very promising way to improve TDCA. Previous ASCA mainly focused on power based Hamming weight leakage model [14,15,17] or Hamming distance leakage model [16]. The original ASCA [14,15] can only work when the deduction on the targeted states is single and correct.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations