A Multi-Round Side Channel Attack on AES using Belief Propagation

Abstract : This paper presents a new side channel attack to recover a block cipher key. No plaintext and no ciphertext are required, no templates are built. Only the leakage measurements collected in many different rounds of the algorithm are exploited. The leakage is considered as a Hamming weight with a Gaussian noise. The chosen target is the Advanced Encryption Standard (AES). Bayesian inference is used to score all guesses on several consecutive round-key bytes. From these scores a Belief Propagation algorithm is used, based on the relations of the Key-Expansion, to discriminate the unique correct guess. Theoretical results according to various noise models are obtained with simulations.
Type de document :
Communication dans un congrès
FPS 2016, Oct 2016, Québec, Canada
Liste complète des métadonnées

Littérature citée [25 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-01405793
Contributeur : Ronan Lashermes <>
Soumis le : mercredi 30 novembre 2016 - 14:41:29
Dernière modification le : jeudi 18 octobre 2018 - 10:36:13
Document(s) archivé(s) le : lundi 27 mars 2017 - 08:55:03

Fichier

paper_final.pdf
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité - Pas d'utilisation commerciale - Pas de modification 4.0 International License

Identifiants

  • HAL Id : hal-01405793, version 1

Citation

Hélène Le Bouder, Ronan Lashermes, Yanis Linge, Gaël Thomas, Jean-Yves Zie. A Multi-Round Side Channel Attack on AES using Belief Propagation. FPS 2016, Oct 2016, Québec, Canada. 〈hal-01405793〉

Partager

Métriques

Consultations de la notice

868

Téléchargements de fichiers

211