TY - GEN
T1 - Fault-tolerant linear collision attack
T2 - 10th International Conference on Information Security Practice and Experience, ISPEC 2014
AU - Wang, Danhui
AU - Wang, An
AU - Zheng, Xuexin
PY - 2014
Y1 - 2014
N2 - The framework of test of chain was presented by Bogdanov et al. in 2012, which combines collision attack with divide-and-conquer side-channel attacks. Its success rate highly depends on the correctness of the chain established from collision attack. In this paper, we construct a fault-tolerant chain which consists of 15 paths, and each path includes only one step. In order to decrease the misjudgments, we combine this chain with correlation power analysis, linear collision attack and search. So the fault-tolerant linear collision attack is proposed. Our experiments show that the new attack is more efficient than the method of Bogdanov et al. Furthermore, we give a fault-identification mechanism to find the positions of wrong key bytes, and thus the subsequent search space can be reduced a great deal. Finally, the choice of threshold in correlation power analysis is discussed in order to optimize our attack.
AB - The framework of test of chain was presented by Bogdanov et al. in 2012, which combines collision attack with divide-and-conquer side-channel attacks. Its success rate highly depends on the correctness of the chain established from collision attack. In this paper, we construct a fault-tolerant chain which consists of 15 paths, and each path includes only one step. In order to decrease the misjudgments, we combine this chain with correlation power analysis, linear collision attack and search. So the fault-tolerant linear collision attack is proposed. Our experiments show that the new attack is more efficient than the method of Bogdanov et al. Furthermore, we give a fault-identification mechanism to find the positions of wrong key bytes, and thus the subsequent search space can be reduced a great deal. Finally, the choice of threshold in correlation power analysis is discussed in order to optimize our attack.
KW - correlation power analysis
KW - linear collision attack
KW - power analysis attack
KW - test of chain
UR - http://www.scopus.com/inward/record.url?scp=84901651552&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-06320-1_18
DO - 10.1007/978-3-319-06320-1_18
M3 - Conference contribution
AN - SCOPUS:84901651552
SN - 9783319063195
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 232
EP - 246
BT - Information Security Practice and Experience - 10th International Conference, ISPEC 2014, Proceedings
PB - Springer Verlag
Y2 - 5 May 2014 through 8 May 2014
ER -