MDASCA: An enhanced algebraic side-channel attack for error tolerance and new leakage model exploitation

27Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Algebraic side-channel attack (ASCA) is a powerful cryptanalysis technique different from conventional side-channel attacks. This paper studies ASCA from three aspects: enhancement, analysis and application. To enhance ASCA, we propose a generic method, called Multiple Deductions-based ASCA (MDASCA), to cope the multiple deductions caused by inaccurate measurements or interferences. For the first time, we show that ASCA can exploit cache leakage models. We analyze the attacks and estimate the minimal amount of leakages required for a successful ASCA on AES under different leakage models. In addition, we apply MDASCA to attack AES on an 8-bit microcontroller under Hamming weight leakage model, on two typical microprocessors under access driven cache leakage model, and on a 32-bit ARM microprocessor under trace driven cache leakage model. Many better results are achieved compared to the previous work. The results are also consistent with the theoretical analysis. Our work shows that MDASCA poses great threats with its excellence in error tolerance and new leakage model exploitation. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Zhao, X., Zhang, F., Guo, S., Wang, T., Shi, Z., Liu, H., & Ji, K. (2012). MDASCA: An enhanced algebraic side-channel attack for error tolerance and new leakage model exploitation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7275 LNCS, pp. 231–248). https://doi.org/10.1007/978-3-642-29912-4_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free