DOI QR코드

DOI QR Code

Bitwise Collision Attack Based on Second-Order Distance

  • Wang, Danhui (China Academy of Electronics and Information Technology) ;
  • Wang, An (State Key Laboratory of Cryptology)
  • Received : 2014.03.11
  • Accepted : 2017.03.31
  • Published : 2017.03.31

Abstract

Correlation-enhanced collision attack has been proposed by Moradi et al. for several years. However, in practical operations, this method costs lots of time on trace acquisition, storage and averaging due to its bytewise collision detection. In this paper, we propose a bitwise collision attack based on second-order distance model. In this method, only 9 average traces are enough to finish a collision attack. Furthermore, two candidate models are given in this study to distinguish collisions, and the corresponding practical experiments are also performed. The experimental results indicate that the operation time of our attack is only 8% of that of correlation-enhanced collision attack, when the two success rates are both above 0.9.

Keywords

References

  1. P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," in Proc. of CRYPTO'96, LNCS 1109, pp. 104-113, August 18-22, 1996.
  2. N. Ferguson, B. Schneier and T. Kohno, Cryptography engineering: design principles and practical applications, Wiley, Hoboken, 2010.
  3. B. Bilgin, S. Nikova, V. Nikov, V. Rijmen and G. Stutz, "Threshold Implementations of All 33 and 44 SBoxes," in Proc. of CHES 2012, LNCS 7428, pp. 76-91, September 9-12, 2012.
  4. D. Canright and L. Batina, "A Very Compact "Perfectly Masked" S-Box for AES," in Proc. of ACNS 2008, LNCS 5037, pp. 446-459, June 3-6, 2008.
  5. C. Carlet, L. Goubin, E. Prouff, M. Quisquater and M. Rivain, "Higher-Order Masking Schemes for SBoxes," in Proc. of FSE 2012, LNCS 7549, pp. 366-384, March 19-21, 2012.
  6. L. Genelle, E. Prouff and M. Quisquater, "Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings," in Proc. of CHES 2011, LNCS 6917, pp. 240-255, September 28-October 1, 2011.
  7. Roy and S. Vivek, "Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012," in Proc. of CHES 2013, LNCS 8086, pp. 417-434, August 20-23, 2013.
  8. P. Kocher, J. Jaffe and B. Jun, "Differential Power Analysis," in Proc. of Crypto 1999, LNCS 1666, pp. 388-397, August 15-19, 1999.
  9. S. Mangard, E. Oswald and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, Springer, Heidelberg, 2007.
  10. S. Chari, J. R. Rao and P. Rohatgi, "Template Attacks," in Proc. of CHES 2002, LNCS 2523, pp. 13-28, August 13-15, 2003.
  11. E. Brier, C. Clavier and F. Olivier, "Correlation Power Analysis with a Leakage Model," in Proc. of CHES 2004, LNCS 3156, pp. 16-29, August 11-13, 2004.
  12. B. Gierlichs, L. Batina, P. Tuyls and B. Preneel, "Mutual Information Analysis," in Proc. of CHES 2008, LNCS 5154, pp. 426-442, August 10-13, 2008.
  13. K. Schramm, T. Wollinger and C. Paar, "A New Class of Collision Attacks and Its Application to DES," in Proc. of FSE 2003, LNCS 2887, pp. 206-222, February 24-26, 2003.
  14. H. Ledig, F. Muller and F. Valette, "Enhancing Collision Attacks," in Proc. of CHES 2004, LNCS 3156, pp. 176-190, August 11-13, 2004.
  15. K. Schramm, G. Leander, P. Felke and C. Parr, "A Collision-Attack on AES Combining Side Channeland Differential- Attack," in Proc. of CHES 2004, LNCS 3156, pp. 163-175, August 11-13, 2004.
  16. Bogdanov, "Improved side-channel collision attacks on AES," in Proc. of SAC07, LNCS 4876, pp. 84-95, August 16-17, 2007.
  17. Bogdanov, "Multiple-Differential Side-Channel Collision Attacks on AES," in Proc. of CHES 2008, LNCS 5154, pp. 30-44, August 10-13, 2008.
  18. A. Sveshnikov and R. A. Silverman, Problems in probability theory, mathematical statistics and theory of random functions, Dover Publications, New York, 1979.
  19. Moradi, O. Mischke and T. Eisenbarth, "Correlation-enhanced power analysis collision attack," in Proc. of CHES 2010, LNCS 6225, pp. 125-139, August 17-20, 2010.
  20. C. Clavier, B. Feix, G. Gagnerot, M. Roussellet and V. Verneuil, "Improved Collision-Correlation Power Analysis on First Order Protected AES," in Proc. of CHES 2011, LNCS 6917, pp. 49-62, September 28-October 1, 2011.
  21. M.-L. Akkar, R. Bevan and P. Dischamp, "Power analysis, what is now possible..." in Proc. of ASIACRYPT 2000, LNCS 1976, pp. 489-502, December 3-7, 2000.

Cited by

  1. A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism vol.2018, pp.None, 2018, https://doi.org/10.1155/2018/2483619