TY - GEN
T1 - Practical template-Algebraic side channel attacks with extremely low data complexity
AU - Oren, Yossef
AU - Weisse, Ofir
AU - Wool, Avishai
PY - 2013
Y1 - 2013
N2 - Template-based Tolerant Algebraic Side Channel Attacks (Template-TASCA) were suggested in [20] as a way of reducing the high data complexity of template attacks by coupling them with algebraic side-channel attacks. In contrast to the maximum-likelihood method used in a standard template attack, the template-Algebraic attack method uses a constraint solver to find the optimal state correlated to the measured side-channel leakage. In this work we present the first application of the template-Algebraic key recovery attack to a publicly available data set (IAIK WS2). We show how our attack can successfully recover the encryption key even when the attacker has extremely limited access to the device under test - only 200 traces in the o?ine phase and as little as a single trace in the online phase.
AB - Template-based Tolerant Algebraic Side Channel Attacks (Template-TASCA) were suggested in [20] as a way of reducing the high data complexity of template attacks by coupling them with algebraic side-channel attacks. In contrast to the maximum-likelihood method used in a standard template attack, the template-Algebraic attack method uses a constraint solver to find the optimal state correlated to the measured side-channel leakage. In this work we present the first application of the template-Algebraic key recovery attack to a publicly available data set (IAIK WS2). We show how our attack can successfully recover the encryption key even when the attacker has extremely limited access to the device under test - only 200 traces in the o?ine phase and as little as a single trace in the online phase.
KW - Analysis of real attacks and threat evaluation
KW - Hardware side-channel exploits and modeling
KW - Smart-card security
UR - http://www.scopus.com/inward/record.url?scp=84882315789&partnerID=8YFLogxK
U2 - 10.1145/2487726.2487733
DO - 10.1145/2487726.2487733
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
AN - SCOPUS:84882315789
SN - 9781450321181
T3 - ACM International Conference Proceeding Series
BT - Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2013
PB - Association for Computing Machinery
T2 - 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2013
Y2 - 23 June 2013 through 24 June 2013
ER -