Improved Collision-Correlation Power Analysis on First Order Protected AES
hal.structure.identifier | DMI | |
dc.contributor.author | CLAVIER, Christophe | |
hal.structure.identifier | DMI | |
dc.contributor.author | FEIX, Benoit | |
hal.structure.identifier | DMI | |
dc.contributor.author | GAGNEROT, Georges | |
hal.structure.identifier | Inside Secure | |
dc.contributor.author | ROUSSELLET, Mylène | |
hal.structure.identifier | Inside Secure | |
hal.structure.identifier | Lithe and fast algorithmic number theory [LFANT] | |
hal.structure.identifier | Institut de Mathématiques de Bordeaux [IMB] | |
dc.contributor.author | VERNEUIL, Vincent | |
dc.date.accessioned | 2024-04-04T02:26:34Z | |
dc.date.available | 2024-04-04T02:26:34Z | |
dc.date.issued | 2011-09 | |
dc.date.conference | 2011-09-28 | |
dc.identifier.uri | https://oskar-bordeaux.fr/handle/20.500.12278/189958 | |
dc.description.abstractEn | The recent results presented by Moradi et al. on AES at CHES 2010 and Witteman et al. on square-and-multiply always RSA exponentiation at CT-RSA 2011 have shown that collision-correlation power analysis is able to recover the secret keys on embedded implementations. However, we noticed that the attack published last year by Moradi et al. is not efficient on correctly first-order protected implementations. We propose in this paper improvements on collision-correlation attacks which require less power traces than classical second-order power analysis techniques. We present here two new methods and show in practice their real efficiency on two first-order protected AES implementations. We also mention that other symmetric embedded algorithms can be targeted by our new techniques. | |
dc.language.iso | en | |
dc.publisher | Springer | |
dc.subject.en | AES | |
dc.subject.en | Side Channel Analysis | |
dc.subject.en | Collision | |
dc.subject.en | Correlation | |
dc.subject.en | DPA | |
dc.subject.en | Masking | |
dc.title.en | Improved Collision-Correlation Power Analysis on First Order Protected AES | |
dc.type | Communication dans un congrès | |
dc.identifier.doi | 10.1007/978-3-642-23951-9_4 | |
dc.subject.hal | Informatique [cs]/Cryptographie et sécurité [cs.CR] | |
bordeaux.page | 49-62 | |
bordeaux.volume | 6917 | |
bordeaux.hal.laboratories | Institut de Mathématiques de Bordeaux (IMB) - UMR 5251 | * |
bordeaux.institution | Université de Bordeaux | |
bordeaux.institution | Bordeaux INP | |
bordeaux.institution | CNRS | |
bordeaux.conference.title | Workshop on Cryptographic Hardware and Embedded Systems - CHES 2011 | |
bordeaux.country | JP | |
bordeaux.conference.city | Nara | |
bordeaux.peerReviewed | oui | |
hal.identifier | inria-00633527 | |
hal.version | 1 | |
hal.invited | non | |
hal.proceedings | oui | |
hal.conference.end | 2011-10-01 | |
hal.popular | non | |
hal.audience | Internationale | |
hal.origin.link | https://hal.archives-ouvertes.fr//inria-00633527v1 | |
bordeaux.COinS | ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.date=2011-09&rft.volume=6917&rft.spage=49-62&rft.epage=49-62&rft.au=CLAVIER,%20Christophe&FEIX,%20Benoit&GAGNEROT,%20Georges&ROUSSELLET,%20Myl%C3%A8ne&VERNEUIL,%20Vincent&rft.genre=unknown |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |