Differential Cluster Analysis
Autor: | Batina, L., Goerlichs, B., Lemke-Rust, K., Clavier, C., Gaj, K. |
---|---|
Přispěvatelé: | Clavier, C, Gaj, K, Clavier, C., Gaj, K. |
Rok vydání: | 2009 |
Předmět: | |
Zdroj: | Clavier, C.; Gaj, K. (ed.), Cryptographic Hardware and Embedded Systems-CHES 2009 : 11th international workshop, Laussane, Switzerland, september 2009 Proceedings, pp. 112-127 Lecture Notes in Computer Science ISBN: 9783642041372 CHES Clavier, C.; Gaj, K. (ed.), Cryptographic Hardware and Embedded Systems-CHES 2009 : 11th international workshop, Laussane, Switzerland, september 2009 Proceedings, 112-127. Berlin : Springer Verlag STARTPAGE=112;ENDPAGE=127;ISSN=0302-9743;TITLE=Clavier, C.; Gaj, K. (ed.), Cryptographic Hardware and Embedded Systems-CHES 2009 : 11th international workshop, Laussane, Switzerland, september 2009 Proceedings |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-642-04138-9_9 |
Popis: | We propose a new technique called Differential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions and it combines features from previously known collision attacks and Differential Power Analysis. It captures more general leakage features and can be applied to algorithmic collisions as well as implementation specific collisions. In addition, the concept is inherently multivariate. Various applications of the approach are possible: with and without power consumption model and single as well as multi-bit leakage can be exploited. Our findings are confirmed by practical results on two platforms: an AVR microcontroller with implemented DES algorithm and an AES hardware module. To our best knowledge, this is the first work demonstrating the feasibility of internal collision attacks on highly parallel hardware platforms. Furthermore, we present a new attack strategy for the targeted AES hardware module. |
Databáze: | OpenAIRE |
Externí odkaz: |