Paper 2004/049
Side Channel Analysis for Reverse Engineering (SCARE) - An Improved Attack Against a Secret A3/A8 GSM Algorithm
Christophe Clavier
Abstract
Side-channel analysis has been recognized for several years as a
practical and powerful means to reveal secret keys of [publicly
known] cryptographic algorithms. Only very recently this kind of
cryptanalysis has been applied to reverse engineer a non-trivial
part of the specification of a proprietary (i.e., secret) algorithm.
The target here is no longer the value of secret key but the secret
specifications of the cryptographic algorithm itself.
In a recent paper, Roman Novak (2003) describes how to recover the
value of one (out of two) substitution table of a secret instance of
the A3/A8 algorithm, the GSM authentication and session-key
generation algorithm. His attack presents however two drawbacks from
a practical viewpoint. First, in order to retrieve one substitution
table (
Metadata
- Available format(s)
- PS
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- GSM AuthenticationA3A8Reverse EngineeringSubstitution TableSide Channel Analysis
- Contact author(s)
- christophe clavier @ gemplus com
- History
- 2004-02-21: received
- Short URL
- https://ia.cr/2004/049
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2004/049, author = {Christophe Clavier}, title = {Side Channel Analysis for Reverse Engineering ({SCARE}) - An Improved Attack Against a Secret A3/A8 {GSM} Algorithm}, howpublished = {Cryptology {ePrint} Archive, Paper 2004/049}, year = {2004}, url = {https://eprint.iacr.org/2004/049} }