首页> 外文期刊>Journal of cryptographic engineering >Unified and optimized linear collision attacks and their application in a non-profiled setting: extended version
【24h】

Unified and optimized linear collision attacks and their application in a non-profiled setting: extended version

机译:统一和优化的线性碰撞攻击及其在非概要文件设置中的应用:扩展版本

获取原文
获取原文并翻译 | 示例
           

摘要

Side-channel collision attacks are one of the most investigated techniques allowing the combination of mathematical and physical cryptanalysis. In this paper, we discuss their relevance in the security evaluation of leaking devices with two main contributions. On one hand, we suggest that the exploitation of linear collisions in block ciphers can be naturally re-written as a Low Density Parity Check Code decoding problem. By combining this re-writing with a Bayesian extension of the collision detection techniques, we improve the efficiency and error tolerance of previously introduced attacks. On the other hand, we provide various experiments in order to discuss the practicality of such attacks compared to standard differential power analysis (DPA). Our results exhibit that collision attacks are less efficient in classical implementation contexts, e.g. 8-bit microcontrollers leaking according to a linear power consumption model. We also observe that the detection of collisions in software devices may be difficult in the case of optimized implementations, because of less regular assembly codes. Interestingly, the soft decoding approach is particularly useful in these more challenging scenarios. Finally, we show that there exist (theoretical) contexts in which collision attacks succeed in exploiting leakages, whereas all other non-profiled side-channel attacks fail.
机译:边信道冲突攻击是研究最多的技术之一,可以结合数学和物理密码分析。在本文中,我们将讨论它们在泄漏设备安全性评估中的相关性,主要有两个方面。一方面,我们建议可以将分组密码中线性冲突的利用自然地重写为低密度奇偶校验码解码问题。通过将此重写与冲突检测技术的贝叶斯扩展相结合,我们提高了先前引入的攻击的效率和容错能力。另一方面,我们提供了各种实验来讨论与标准差分功率分析(DPA)相比,此类攻击的实用性。我们的结果表明,碰撞攻击在经典的实现环境中效率较低,例如8位微控制器根据线性功耗模型泄漏。我们还观察到,由于优化了常规汇编代码,因此在优化实现的情况下,很难检测软件设备中的冲突。有趣的是,软解码方法在这些更具挑战性的场景中特别有用。最后,我们表明存在(理论上)上下文,其中碰撞攻击成功利用了泄漏,而所有其他非剖析的旁通道攻击都失败了。

著录项

  • 来源
    《Journal of cryptographic engineering》 |2013年第1期|45-58|共14页
  • 作者单位

    UCL Crypto Group, Universite catholique de Louvain,Place du Levant 3, 1348, Louvain-1a-Neuve, Belgium DGA-MI, Bruz, France;

    UCL Crypto Group, Universite catholique de Louvain,Place du Levant 3, 1348, Louvain-1a-Neuve, Belgium;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号