2019
DOI: 10.1007/978-3-030-15462-2_6
|View full text |Cite
|
Sign up to set email alerts
|

Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys

Abstract: Evaluation of security margins after a side-channel attack is an important step of side-channel resistance evaluation. The security margin indicates the brute force effort needed to recover the key given the leakages. In the recent years, several solutions for key rank estimation algorithms have been proposed. All these solutions give an interesting trade-off between the tightness of the result and the time complexity for symmetric key. Unfortunately, none of them has a linear complexity in the number of subke… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(32 citation statements)
references
References 15 publications
0
32
0
Order By: Relevance
“…This issue is addressed by a recent work [VCGS13], with an algorithm to estimate the upper and lower bounds for the rank of the correct full-key. More efficient ranking algorithms have been further developed [GGP + 15, BLvV15, MOOS15, DW17,Gro18]. As these ranking algorithms require access to a data set (e.g., with q measurement traces) to find the correct full-key rank over the set, the empirical GE estimation needs to average the ranks on N such independent data sets.…”
Section: Introductionmentioning
confidence: 99%
“…This issue is addressed by a recent work [VCGS13], with an algorithm to estimate the upper and lower bounds for the rank of the correct full-key. More efficient ranking algorithms have been further developed [GGP + 15, BLvV15, MOOS15, DW17,Gro18]. As these ranking algorithms require access to a data set (e.g., with q measurement traces) to find the correct full-key rank over the set, the empirical GE estimation needs to average the ranks on N such independent data sets.…”
Section: Introductionmentioning
confidence: 99%
“…Due to computational limitations, existing key rank estimation algorithms estimate the key rank with some bounded error [Gro19]. As detailed in [Gro19], the histogram of the log probabilities corresponding to key guesses for a key byte is convolved with the histograms of the log probabilities corresponding to key guesses for each and every key byte to find the rank of the correct key with some bounded error. Hence, KR is typically reported as a tight range with an upper bound and a lower bound.…”
Section: Key Rankmentioning
confidence: 99%
“…The question then becomes can we design efficient algorithms that traverse the lists of chunk candidates to combine chunk candidates c i , obtaining complete key candidates c having high total scores obtained by summation? This question has been previously addressed in the side-channel analysis literature, with a variety of different algorithms being possible to solve this problem and the related problem known as key rank estimation [12][13][14][15][16][17][18][19][20][21][22][23][24][25][26].…”
Section: P(r)mentioning
confidence: 99%
“…Broadly speaking, optimal key enumeration algorithms [18,28] tend to consume more memory and to be less efficient while generating high-scoring key candidates, whereas nonoptimal key enumeration algorithms [12][13][14][15][16][17]26,29] are expected to run faster and to consume less memory. Table 1 shows a preliminary taxonomy of the key enumeration algorithms to be reviewed in this section.…”
Section: Key Enumeration Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation