Paper 2024/2079
Solving AES-SAT Using Side-Channel Hints: A Practical Assessment
Abstract
Side-channel attacks exploit information leaked through non-primary channels, such as power consumption, electromagnetic emissions, or timing, to extract sensitive data from cryptographic devices. Over the past three decades, side-channel analysis has evolved into a mature research field with well-established methodologies for analyzing standard cryptographic algorithms like the Advanced Encryption Standard (AES). However, the integration of side-channel analysis with formal methods remains relatively unexplored. In this paper, we present a hybrid attack on AES that combines side-channel analysis with SAT. We model AES as a SAT problem and leverage hints of the input and output values of the S-boxes, extracted via profiled deep learning-based power analysis, to solve it. Experimental results on an ATXmega128D4 MCU implementation of AES-128 demonstrate that the SAT-assisted approach consistently recovers the full encryption key from a single trace, captured from devices different from those used for profiling, within one hour. In contrast, without SAT assistance, the success rate remains below 80% after 26 hours of key enumeration.
Metadata
- Available format(s)
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- AESside-channel attackSATpower analysisdeep learning
- Contact author(s)
- dubrova @ kth se
- History
- 2024-12-27: approved
- 2024-12-26: received
- See all versions
- Short URL
- https://ia.cr/2024/2079
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/2079, author = {Elena Dubrova}, title = {Solving {AES}-{SAT} Using Side-Channel Hints: A Practical Assessment}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/2079}, year = {2024}, url = {https://eprint.iacr.org/2024/2079} }