loading
Papers

Research.Publish.Connect.

Paper

Authors: Luk Bettale ; Emmanuelle Dottax and Mailody Ramphort

Affiliation: Idemia and France

ISBN: 978-989-758-319-3

Keyword(s): Algebraic Side-Channel Attack, Masking, AES, Template Attack, SAT Solving.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data Engineering ; Databases and Data Security ; Information and Systems Security ; Software Security

Abstract: Algebraic Side-Channel Attacks allow an attacker to exploit single trace leakages in an automated way. The literature mentions the fact that these attacks have the potential to defeat the masking countermeasure. Though, this context has not been explored a lot and the lack of experiments makes it difficult to evaluate the feasibility of these attacks in practice. We set-up a framework to perform such attacks and made new experiments on state-of-the-art masking schemes. We focused on the number of leakages required for an attack, and considered realistic leakage points. Our experiments and analyses allow to precisely estimate the minimal number of leakages required for a successful key recovery.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 100.26.176.182

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Bettale, L.; Dottax, E. and Ramphort, M. (2018). Algebraic Side-Channel Attacks on Masked Implementations of AES.In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 2 SECRYPT: SECRYPT, ISBN 978-989-758-319-3, pages 258-269. DOI: 10.5220/0006869504240435

@conference{secrypt18,
author={Luk Bettale. and Emmanuelle Dottax. and Mailody Ramphort.},
title={Algebraic Side-Channel Attacks on Masked Implementations of AES},
booktitle={Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 2 SECRYPT: SECRYPT,},
year={2018},
pages={258-269},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006869504240435},
isbn={978-989-758-319-3},
}

TY - CONF

JO - Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 2 SECRYPT: SECRYPT,
TI - Algebraic Side-Channel Attacks on Masked Implementations of AES
SN - 978-989-758-319-3
AU - Bettale, L.
AU - Dottax, E.
AU - Ramphort, M.
PY - 2018
SP - 258
EP - 269
DO - 10.5220/0006869504240435

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.