Back to Search Start Over

One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores.

Authors :
Moradi, Amir
Mischke, Oliver
Paar, Christof
Source :
IEEE Transactions on Computers. Sep2013, Vol. 62 Issue 9, p1786-1798. 13p.
Publication Year :
2013

Abstract

When complex functions, for example, substitution boxes of block ciphers, are realized in hardware, timing attributes of the underlying combinational circuit depend on the input/output changes of the function. These characteristics can be exploited by the help of a relatively new scheme called fault sensitivity analysis. A collision timing attack which exploits the data-dependent timing characteristics of combinational circuits is demonstrated in this paper. The attack is based on an also recently published correlation collision attack, which avoids the need for a hypothetical timing model for the underlying combinational circuit to recover the secret materials. The target platforms of our proposed attack are 14 AES ASIC cores of the SASEBO LSI chips in three different process technologies, 13 nm, 90 nm, and 65 nm. Successfully breaking all cores including the DPA-protected and fault attack protected cores indicates the strength of the attack. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
00189340
Volume :
62
Issue :
9
Database :
Academic Search Index
Journal :
IEEE Transactions on Computers
Publication Type :
Academic Journal
Accession number :
89454577
Full Text :
https://doi.org/10.1109/TC.2012.154