Paper 2014/683

Error-Tolerant Algebraic Side-Channel Attacks Using BEE

Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi, and Ronglin Hao

Abstract

Algebraic side-channel attacks are a type of side-channel analysis which can recover the secret information with a small number of samples (e.g., power traces). However, this type of side-channel analysis is sensitive to measurement errors which may make the attacks fail. In this paper, we propose a new method of algebraic side-channel attacks which considers noisy leakages as integers restricted to intervls and finds out the secret information with a constraint programming solver named BEE. To demonstrate the efficiency of this new method in algebraic side-channel attacks, we analyze some popular implementations of block ciphers---PRESENT, AES, and SIMON under the Hamming weight or Hamming distance leakage model. For AES, our method requires the least leakages compared with existing works under the same error model. For both PRESENT and SIMON, we provide the first analytical results of them under algebraic side-channel attacks in the presence of errors. To further demonstrate the wide applicability of this new method, we also extend it to cold boot attacks. In the cold boot attacks against AES, our method increases the success rate by over $25\%$ than previous works.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
algebraic side-channel attackHamming weight leakageerror-tolerancecold boot attack
Contact author(s)
lsong @ is ac cn
History
2014-09-01: received
Short URL
https://ia.cr/2014/683
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/683,
      author = {Ling Song and Lei Hu and Siwei Sun and Zhang Zhang and Danping Shi and Ronglin Hao},
      title = {Error-Tolerant Algebraic Side-Channel Attacks Using {BEE}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2014/683},
      year = {2014},
      url = {https://eprint.iacr.org/2014/683}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.