Skip to Main content Skip to Navigation
Conference papers

A Multi-Round Side Channel Attack on AES using Belief Propagation

Abstract : This paper presents a new side channel attack to recover a block cipher key. No plaintext and no ciphertext are required, no templates are built. Only the leakage measurements collected in many different rounds of the algorithm are exploited. The leakage is considered as a Hamming weight with a Gaussian noise. The chosen target is the Advanced Encryption Standard (AES). Bayesian inference is used to score all guesses on several consecutive round-key bytes. From these scores a Belief Propagation algorithm is used, based on the relations of the Key-Expansion, to discriminate the unique correct guess. Theoretical results according to various noise models are obtained with simulations.
Document type :
Conference papers
Complete list of metadata

Cited literature [25 references]  Display  Hide  Download
Contributor : Ronan Lashermes Connect in order to contact the contributor
Submitted on : Wednesday, November 30, 2016 - 2:41:29 PM
Last modification on : Friday, February 4, 2022 - 3:34:41 AM
Long-term archiving on: : Monday, March 27, 2017 - 8:55:03 AM


Files produced by the author(s)


Distributed under a Creative Commons Attribution - NonCommercial - NoDerivatives 4.0 International License


  • HAL Id : hal-01405793, version 1


Hélène Le Bouder, Ronan Lashermes, Yanis Linge, Gaël Thomas, Jean-Yves Zie. A Multi-Round Side Channel Attack on AES using Belief Propagation. FPS 2016, Oct 2016, Québec, Canada. ⟨hal-01405793⟩



Record views


Files downloads