2019
DOI: 10.1109/access.2019.2896256
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Collision Power Attack on AES Encryption in Edge Computing

Abstract: Edge computing has become a promising paradigm for the context-aware and delay-sensitive IoT data analytics. For the sake of security, some cryptographic algorithms such as AES, RSA, and so on, are employed for the encryption communication and authentication. The collision power attack is a typical physical attack to recover the secret key of the AES algorithm. However, almost all collision attacks aim at the detection of internal collisions caused by the output of S-boxes, and the linear layers are not concer… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
21
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 39 publications
(21 citation statements)
references
References 19 publications
0
21
0
Order By: Relevance
“…The third-party compromised the functionality of a given cryptosystem by exploiting the physical edge computing devices. Authors in [53] prevented the employed AES cryptographic algorithm against the side-channel attack by random masking and shuffling of the S-BOXES. An attack detection technique based on distributed extreme machine learning technology is employed in [84] to eliminate the side-channel attack on the used cryptosystem.…”
Section: F Physical Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…The third-party compromised the functionality of a given cryptosystem by exploiting the physical edge computing devices. Authors in [53] prevented the employed AES cryptographic algorithm against the side-channel attack by random masking and shuffling of the S-BOXES. An attack detection technique based on distributed extreme machine learning technology is employed in [84] to eliminate the side-channel attack on the used cryptosystem.…”
Section: F Physical Attackmentioning
confidence: 99%
“…computation and communication costs). Only four techniques [50], [51], [53], and [78] employed the lightweight metrics. Hence, future research on security and privacy in edge computing should focus on lightweight security, for example, Elliptic Curve Cryptography, Permutation Based Lightweight Cryptography, Block-Ciphers Lightweight Cryptography, etc.…”
Section: A Lightweight Security Featuresmentioning
confidence: 99%
“…At last, Table 2 summarizes several typical collision attacks and their attack capabilities. The typical collision attacks we select include linear collision attack (LCA) [15], collision correlation attack (CCA) [14], non-linear collision attack (NLCA) [22], near collision attack (NCA) [23],collision attack on linear layers (LLCA) [24], and scalable collision attack on linear layers (LLSCA) [24]. Four practical hotspot issues for side channel collision attacks are used to compare, including whether traversal of plaintexts is required, whether practically determine the threshold is required, whether the leak samples is easily identifiable, and whether re-used masking scheme can be broken.…”
Section: Attack On Masked S-boxes Of Aesmentioning
confidence: 99%
“…The efficiency of the second-order DPA greatly depends on the combining function it employs and the leakage model it constructs, but the combining function is just an approximate representation of the leakage. Collision attack [5][6][7] is another extensively applied method for achieving an attack on masked implementations. Clavier et al [5] utilized the reuse of masks to show the relationship among masked data in various substitution boxes (s-boxes) to perform the collision.…”
mentioning
confidence: 99%
“…Clavier et al [5] utilized the reuse of masks to show the relationship among masked data in various substitution boxes (s-boxes) to perform the collision. Scalable collision attack [7] is a fault-tolerant collision attack that can keep more useful key-related information to increase the success rate. This study presents a correlation leakage model which is a precise characterization of the leakage in first-order masked implementations.…”
mentioning
confidence: 99%