Skip to Main content Skip to Navigation
Conference papers

A Multi-Round Side Channel Attack on AES using Belief Propagation

Abstract : This paper presents a new side channel attack to recover a block cipher key. No plaintext and no ciphertext are required, no templates are built. Only the leakage measurements collected in many different rounds of the algorithm are exploited. The leakage is considered as a Hamming weight with a Gaussian noise. The chosen target is the Advanced Encryption Standard (AES). Bayesian inference is used to score all guesses on several consecutive round-key bytes. From these scores a Belief Propagation algorithm is used, based on the relations of the Key-Expansion, to discriminate the unique correct guess. Theoretical results according to various noise models are obtained with simulations.
Document type :
Conference papers
Complete list of metadata

Cited literature [25 references]  Display  Hide  Download

https://hal.inria.fr/hal-01405793
Contributor : Ronan Lashermes <>
Submitted on : Wednesday, November 30, 2016 - 2:41:29 PM
Last modification on : Friday, April 2, 2021 - 9:54:02 AM
Long-term archiving on: : Monday, March 27, 2017 - 8:55:03 AM

File

paper_final.pdf
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution - NonCommercial - NoDerivatives 4.0 International License

Identifiers

  • HAL Id : hal-01405793, version 1

Citation

Hélène Le Bouder, Ronan Lashermes, Yanis Linge, Gaël Thomas, Jean-Yves Zie. A Multi-Round Side Channel Attack on AES using Belief Propagation. FPS 2016, Oct 2016, Québec, Canada. ⟨hal-01405793⟩

Share

Metrics

Record views

1851

Files downloads

995