首页> 外文会议>Constructive side-channel analysis and secure design. >MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation
【24h】

MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation

机译:MDASCA:用于容错和新泄漏模型开发的增强型代数边通道攻击

获取原文
获取原文并翻译 | 示例

摘要

Algebraic side-channel attack (ASCA) is a powerful crypt-analysis technique different from conventional side-channel attacks. This paper studies ASCA from three aspects: enhancement, analysis and application. To enhance ASCA, we propose a generic method, called Multiple Deductions-based ASCA (MDASCA), to cope the multiple deductions caused by inaccurate measurements or interferences. For the first time, we show that ASCA can exploit cache leakage models. We analyze the attacks and estimate the minimal amount of leakages required for a successful ASCA on AES under different leakage models. In addition, we apply MDASCA to attack AES on an 8-bit microcontroller under Hamming weight leakage model, on two typical microprocessors under access driven cache leakage model, and on a 32-bit ARM microprocessor under trace driven cache leakage model. Many better results are achieved compared to the previous work. The results are also consistent with the theoretical analysis. Our work shows that MDASCA poses great threats with its excellence in error tolerance and new leakage model exploitation.
机译:代数边信道攻击(ASCA)是一种强大的密码分析技术,与常规边信道攻击不同。本文从三个方面来研究ASCA:增强,分析和应用。为了增强ASCA,我们提出了一种通用方法,称为基于多次扣除的ASCA(MDASCA),以应对由于不准确的测量或干扰而导致的多次扣除。我们第一次展示了ASCA可以利用缓存泄漏模型。我们分析攻击并估计在不同泄漏模型下在AES上成功进行ASCA所需的最小泄漏量。此外,我们将MDASCA应用于在Hamming重量泄漏模型下的8位微控制器,在访问驱动的缓存泄漏模型下的两个典型微处理器以及在跟踪驱动的缓存泄漏模型下的32位ARM微处理器上攻击AES。与以前的工作相比,可以实现许多更好的结果。结果也与理论分析一致。我们的工作表明,MDASCA凭借其出色的容错能力和新的泄漏模型开发能力面临着巨大的威胁。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号