You are looking at a specific version 20210616:133657 of this paper. See the latest version.

Paper 2021/817

Give Me 5 Minutes: Attacking ASCAD with a Single Side-Channel Trace

Olivier Bronchain and Gaëtan Cassiers and François-Xavier Standaert

Abstract

In this note, we describe an attack against the ANSSI Side-Channel Analysis Database (ASCAD), which recovers the full key using the leakage of a single masked block cipher execution. The attack uses a new open-source Side-Channel Analysis Library (SCALib), which allows running the leakage profiling and attacking in less than 5 minutes. It exploits well-known techniques, yet improves significantly over the best known attacks against ASCAD. We conclude by questioning the impact of these experimental findings for side-channel security evaluations.

Metadata
Available format(s)
PDF
Publication info
Preprint.
Contact author(s)
olivier bronchain @ uclouvain be,gaetan cassiers @ uclouvain be
History
2022-06-08: revised
2021-06-16: received
See all versions
Short URL
https://ia.cr/2021/817
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.