Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power Analysis - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2013

Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power Analysis

Christophe Clavier
DMI
Quentin Isorez
  • Fonction : Auteur
Antoine Wurcker
  • Fonction : Auteur
DMI

Résumé

Despite Kerckhoffs's principle, proprietary or otherwise secret cryptographic algorithms are still used in real life. For security and efficiency reasons a common design practice simply modifies some parameters of widely used and well studied encryption standards. In this paper, we investigate the feasibility of reverse engineering the secret specifications of an AES-like block cipher by SCARE techniques based on collision power analysis. In the considered observational model, we demonstrate that an adversary who does not know the secret key can recover the full set of secret parameters of an AES-like software implementation even if it is protected by common first-order Boolean masking and shuffling of independent operations. We study possible countermeasures and recall some simple guidelines to mitigate the side-channel information with the aim to thwart our attacks.

Dates et versions

hal-00947642 , version 1 (17-02-2014)

Identifiants

Citer

Christophe Clavier, Quentin Isorez, Antoine Wurcker. Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power Analysis. 14th International Conference on Cryptology in India, Dec 2013, Mumbai, India. pp.116-135, ⟨10.1007/978-3-319-03515-4_8⟩. ⟨hal-00947642⟩

Collections

UNILIM CNRS XLIM
89 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More