Skip to Main content Skip to Navigation

Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power Analysis

Abstract : Despite Kerckhoffs's principle, proprietary or otherwise secret cryptographic algorithms are still used in real life. For security and efficiency reasons a common design practice simply modifies some parameters of widely used and well studied encryption standards. In this paper, we investigate the feasibility of reverse engineering the secret specifications of an AES-like block cipher by SCARE techniques based on collision power analysis. In the considered observational model, we demonstrate that an adversary who does not know the secret key can recover the full set of secret parameters of an AES-like software implementation even if it is protected by common first-order Boolean masking and shuffling of independent operations. We study possible countermeasures and recall some simple guidelines to mitigate the side-channel information with the aim to thwart our attacks.
Document type :
Conference papers
Complete list of metadatas

https://hal.archives-ouvertes.fr/hal-00947642
Contributor : Yolande Vieceli <>
Submitted on : Monday, February 17, 2014 - 10:48:56 AM
Last modification on : Tuesday, February 25, 2020 - 12:36:06 PM

Links full text

Identifiers

Collections

Citation

Christophe Clavier, Quentin Isorez, Antoine Wurcker. Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power Analysis. 14th International Conference on Cryptology in India, Dec 2013, Mumbai, India. pp.116-135, ⟨10.1007/978-3-319-03515-4_8⟩. ⟨hal-00947642⟩

Share

Metrics

Record views

138