Paper 2011/579
Clockwise Collision Analysis -- Overlooked Side-Channel Leakage Inside Your Measurements
Yang Li, Daisuke Nakatsu, Qi Li, Kazuo Ohta, and Kazuo Sakiyama
Abstract
This paper presents a new side-channel attack technique called {\it clockwise collision} analysis. For the cryptographic implementations using synchronous digital circuit with a loop architecture, signal transitions as well as the side-channel leakage relates to not only the input data in the current cycle, but also the status in one-cycle before. The clockwise collision utilizes the fact that little computation is required in the second clock cycle when the inputs for two consecutive clock cycles are the same. In contrast, the previously known {\it computational collision} utilizes the fact that the computation of the same input value leads to similar side-channel leakage. By experimentation, we demonstrate the feasibility and vulnerability for this novel clockwise collision analysis both by injecting faults and by analyzing the power consumption.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- Side-channel attackclockwise collisionfaultpower consumption
- Contact author(s)
- liyang @ ice uec ac jp
- History
- 2011-11-02: received
- Short URL
- https://ia.cr/2011/579
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2011/579, author = {Yang Li and Daisuke Nakatsu and Qi Li and Kazuo Ohta and Kazuo Sakiyama}, title = {Clockwise Collision Analysis -- Overlooked Side-Channel Leakage Inside Your Measurements}, howpublished = {Cryptology {ePrint} Archive, Paper 2011/579}, year = {2011}, url = {https://eprint.iacr.org/2011/579} }