Abstract

Side-channel collision attacks have shown good efficiency on breaking unprotected or reused-mask implementations of block ciphers. Depending on the relationship between “Hamming distance of values” and “average distance of traces”, this work presents a novel bit-policy based chosen-plaintext collision attack to break a software implementation of reused-mask AES. Some factors affecting the success rates of the proposed scheme and their reasons are analyzed, such as how to measure the distance of traces, signal-to-noise ratio (SNR), how to select points of interest (POI) and the number of traces (n). In this paper, two measurements, the least square method (LSM) and the central moment product method (CMP), are adopted to calculate the distance of traces. Then their probability distribution and efficiency are theoretically analyzed and simulated. As a result, CMP outperforms LSM, and all the other three factors, i.e. SNR, POI, n, are relevant to the distribution of LSM and CMP. When LSM and CMP are combined with the proposed scheme and the compared ones, both theoretical and practical analysis are given to illustrate how the number of traces impacts on the success rates at different levels of SNR; as a result the developed attack has the best performance among all the compared schemes at both low and high level of SNR, especially at high level of SNR. To gain a success rate of 95%, at SNR of 0 dB and −8 dB, our optimal scheme and the compared optimal scheme have 800 and 4500 less energy traces, respectively. Furthermore, our attack requires no detailed knowledge about the design of SBoxes, nor does it require templates for profiling.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.