How secure is AES under leakage

4Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

While traditionally cryptographic algorithms have been designed with the black-box security in mind, they often have to deal with a much stronger adversary – namely, an attacker that has some access to the execution environment of a cryptographic algorithm. This can happen in such grey-box settings as physical side-channel attacks or digital forensics as well as due to Trojans. In this paper, we aim to address this challenge for symmetric-key cryptography. We study the security of the Advanced Encryption Standard (AES) in the presence of explicit leakage: We let a part of the internal secret state leak in each operation. We consider a wide spectrum of settings – from adversaries with limited control all the way to the more powerful attacks with more knowledge of the computational platform. To mount key recoveries under leakage, we develop several novel cryptanalytic techniques such as differential bias attacks. Moreover, we demonstrate and quantify the effect of uncertainty and implementation countermeasures under such attacks: black-boxed rounds, space randomization, time randomization, and dummy operations.We observe that the residual security of AES can be considerable, especially with uncertainty and basic countermeasures in place.

References Powered by Scopus

Differential power analysis

6021Citations
N/AReaders
Get full text

Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems

3386Citations
N/AReaders
Get full text

PRINCE - A low-latency block cipher for pervasive computing applications

675Citations
N/AReaders
Get full text

Cited by Powered by Scopus

SlEPX: An efficient lightweight cipher for visual protection of scalable HEVC extension

12Citations
N/AReaders
Get full text

Advances in Side Channel Attacks and Countermeasures

8Citations
N/AReaders
Get full text

Improvements on security evaluation of AES against differential bias attack

0Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Bogdanov, A., & Isobe, T. (2015). How secure is AES under leakage. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9453, pp. 361–385). Springer Verlag. https://doi.org/10.1007/978-3-662-48800-3_15

Readers over time

‘17‘18‘19‘20‘21‘23‘2402468

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 15

65%

Professor / Associate Prof. 3

13%

Researcher 3

13%

Lecturer / Post doc 2

9%

Readers' Discipline

Tooltip

Computer Science 16

76%

Physics and Astronomy 2

10%

Engineering 2

10%

Design 1

5%

Save time finding and organizing research with Mendeley

Sign up for free
0