Title
Correlation-enhanced power analysis collision attack
Abstract
Side-channel based collision attacks are a mostly disregarded alternative to DPA for analyzing unprotected implementations. The advent of strong countermeasures, such as masking, has made further research in collision attacks seemingly in vain. In this work, we show that the principles of collision attacks can be adapted to efficiently break some masked hardware implementation of the AES which still have first-order leakage. The proposed attack breaks an AES implementation based on the corrected version of the masked S-box of Canright and Batina presented at ACNS 2008. The attack requires only six times the number of traces necessary for breaking a comparable unprotected implementation. At the same time, the presented attack has minimal requirements on the abilities and knowledge of an adversary. The attack requires no detailed knowledge about the design, nor does it require a profiling phase.
Year
DOI
Venue
2010
10.1007/978-3-642-15031-9_9
IACR Cryptology ePrint Archive
Keywords
DocType
Volume
correlation-enhanced power analysis collision,first-order leakage,unprotected implementation,aes implementation,minimal requirement,proposed attack,comparable unprotected implementation,detailed knowledge,hardware implementation,collision attack,corrected version,masking,first order,dpa,power analysis,aes
Conference
2010
ISSN
ISBN
Citations 
0302-9743
3-642-15030-6
88
PageRank 
References 
Authors
3.36
26
3
Name
Order
Citations
PageRank
Amir Moradi196080.66
Oliver Mischke220411.53
Thomas Eisenbarth384061.33