A Multi-Round Side Channel Attack on AES using Belief Propagation - Inria - Institut national de recherche en sciences et technologies du numérique Access content directly
Conference Papers Year : 2016

A Multi-Round Side Channel Attack on AES using Belief Propagation

Abstract

This paper presents a new side channel attack to recover a block cipher key. No plaintext and no ciphertext are required, no templates are built. Only the leakage measurements collected in many different rounds of the algorithm are exploited. The leakage is considered as a Hamming weight with a Gaussian noise. The chosen target is the Advanced Encryption Standard (AES). Bayesian inference is used to score all guesses on several consecutive round-key bytes. From these scores a Belief Propagation algorithm is used, based on the relations of the Key-Expansion, to discriminate the unique correct guess. Theoretical results according to various noise models are obtained with simulations.
Fichier principal
Vignette du fichier
paper_final.pdf (437.45 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01405793 , version 1 (30-11-2016)

Licence

Attribution - NonCommercial - NoDerivatives

Identifiers

  • HAL Id : hal-01405793 , version 1

Cite

Hélène Le Bouder, Ronan Lashermes, Yanis Linge, Gaël Thomas, Jean-Yves Zie. A Multi-Round Side Channel Attack on AES using Belief Propagation. FPS 2016, Oct 2016, Québec, Canada. ⟨hal-01405793⟩
1310 View
1078 Download

Share

Gmail Facebook X LinkedIn More