Back to Search Start Over

Improved Side-Channel Collision Attacks on AES.

Authors :
Hutchison, David
Kanade, Takeo
Kittler, Josef
Kleinberg, Jon M.
Mattern, Friedemann
Mitchell, John C.
Naor, Moni
Nierstrasz, Oscar
Pandu Rangan, C.
Steffen, Bernhard
Sudan, Madhu
Terzopoulos, Demetri
Tygar, Doug
Vardi, Moshe Y.
Weikum, Gerhard
Adams, Carlisle
Miri, Ali
Wiener, Michael
Bogdanov, Andrey
Source :
Selected Areas in Cryptography (978-3-540-77359-7); 2007, p84-95, 12p
Publication Year :
2007

Abstract

Side-channel collision attacks were proposed in [1] and applied to AES in [2]. These are based on detecting collisions in certain positions of the internal state after the first AES round for different executions of the algorithm. The attack needs about 40 measurements and 512 MB precomputed values as well as requires the chosen-plaintext possibility. In this paper we show how to mount a collision attack on AES using only 6 measurements and about 237.15 offline computational steps working with a probability of about 0.85. Another attack uses only 7 measurements and finds the full encryption key with an offline complexity of about 234.74 with a probability of 0.99. All our attacks require a negligible amount of memory only and work in the known-plaintext model. This becomes possible by considering collisions in the S-box layers both for different AES executions and within the same AES run. All the attacks work under the assumption that one-byte collisions are detectable. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISBNs :
9783540773597
Database :
Complementary Index
Journal :
Selected Areas in Cryptography (978-3-540-77359-7)
Publication Type :
Book
Accession number :
34136095
Full Text :
https://doi.org/10.1007/978-3-540-77360-3_6