Paper 2011/162

Collision Timing Attack when Breaking 42 AES ASIC Cores

Amir Moradi, Oliver Mischke, and Christof Paar

Abstract

A collision timing attack which exploits the data-dependent timing characteristics of combinational circuits is demonstrated. The attack is based on the correlation collision attack presented at CHES 2010, and the timing attributes of combinational circuits when implementing complex functions, e.g., S-boxes, in hardware are exploited by the help of the scheme used in another CHES 2010 paper namely fault sensitivity analysis. Similarly to other side-channel collision attacks, our approach avoids the need for a hypothetical model to recover the secret materials. The results when attacking all 14 AES ASIC cores of the SASEBO LSI chips in three different process technologies, 130nm, 90nm, and 65nm, are presented. Successfully breaking the DPA-protected and the fault attack protected cores indicates the strength of the attack.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Unknown where it was published
Keywords
Timing AttackCollision AttackFault SensitivityAESASIC
Contact author(s)
moradi @ crypto rub de
History
2011-04-01: revised
2011-04-01: received
See all versions
Short URL
https://ia.cr/2011/162
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2011/162,
      author = {Amir Moradi and Oliver Mischke and Christof Paar},
      title = {Collision Timing Attack when Breaking 42 AES ASIC Cores},
      howpublished = {Cryptology ePrint Archive, Paper 2011/162},
      year = {2011},
      note = {\url{https://eprint.iacr.org/2011/162}},
      url = {https://eprint.iacr.org/2011/162}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.