Paper 2024/2079

Solving AES-SAT Using Side-Channel Hints: A Practical Assessment

Elena Dubrova, KTH Royal Institute of Technology
Abstract

Side-channel attacks exploit information leaked through non-primary channels, such as power consumption, electromagnetic emissions, or timing, to extract sensitive data from cryptographic devices. Over the past three decades, side-channel analysis has evolved into a mature research field with well-established methodologies for analyzing standard cryptographic algorithms like the Advanced Encryption Standard (AES). However, the integration of side-channel analysis with formal methods remains relatively unexplored. In this paper, we present a hybrid attack on AES that combines side-channel analysis with SAT. We model AES as a SAT problem and leverage hints of the input and output values of the S-boxes, extracted via profiled deep learning-based power analysis, to solve it. Experimental results on an ATXmega128D4 MCU implementation of AES-128 demonstrate that the SAT-assisted approach consistently recovers the full encryption key from a single trace, captured from devices different from those used for profiling, within one hour. In contrast, without SAT assistance, the success rate remains below 80% after 26 hours of key enumeration.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
AESside-channel attackSATpower analysisdeep learning
Contact author(s)
dubrova @ kth se
History
2024-12-27: approved
2024-12-26: received
See all versions
Short URL
https://ia.cr/2024/2079
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/2079,
      author = {Elena Dubrova},
      title = {Solving {AES}-{SAT} Using Side-Channel Hints:  A Practical Assessment},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/2079},
      year = {2024},
      url = {https://eprint.iacr.org/2024/2079}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.