Practical template-Algebraic side channel attacks with extremely low data complexity

Yossef Oren, Ofir Weisse, Avishai Wool

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

Template-based Tolerant Algebraic Side Channel Attacks (Template-TASCA) were suggested in [20] as a way of reducing the high data complexity of template attacks by coupling them with algebraic side-channel attacks. In contrast to the maximum-likelihood method used in a standard template attack, the template-Algebraic attack method uses a constraint solver to find the optimal state correlated to the measured side-channel leakage. In this work we present the first application of the template-Algebraic key recovery attack to a publicly available data set (IAIK WS2). We show how our attack can successfully recover the encryption key even when the attacker has extremely limited access to the device under test - only 200 traces in the o?ine phase and as little as a single trace in the online phase.

Original languageEnglish
Title of host publicationProceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2013
PublisherAssociation for Computing Machinery
ISBN (Print)9781450321181
DOIs
StatePublished - 1 Jan 2013
Externally publishedYes
Event2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2013 - Tel-Aviv, Israel
Duration: 23 Jun 201324 Jun 2013

Publication series

NameACM International Conference Proceeding Series

Conference

Conference2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2013
Country/TerritoryIsrael
CityTel-Aviv
Period23/06/1324/06/13

Keywords

  • Analysis of real attacks and threat evaluation
  • Hardware side-channel exploits and modeling
  • Smart-card security

Fingerprint

Dive into the research topics of 'Practical template-Algebraic side channel attacks with extremely low data complexity'. Together they form a unique fingerprint.

Cite this