2020
DOI: 10.46586/tches.v2020.i3.22-72
|View full text |Cite
|
Sign up to set email alerts
|

Investigating Profiled Side-Channel Attacks Against the DES Key Schedule

Abstract: Recent publications describe profiled single trace side-channel attacks (SCAs) against the DES key-schedule of a “commercially available security controller”. They report a significant reduction of the average remaining entropy of cryptographic keys after the attack, with surprisingly large, key-dependent variations of attack results, and individual cases with remaining key entropies as low as a few bits. Unfortunately, they leave important questions unanswered: Are the reported wide distributions of results p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…The authors of [7] provided us with their measurement data. The provided data set consists of a profiling set and an attack set.…”
Section: Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…The authors of [7] provided us with their measurement data. The provided data set consists of a profiling set and an attack set.…”
Section: Methodsmentioning
confidence: 99%
“…We consider variations of the leakage models identified in previous works [7,8,[14][15][16][17]. The models assume that the keydependent leakage originates from updates (c i+1 , d i+1 ) ← (c i , d i ) of the Cand D-registers and/or updates k i+1 ← k i of the round-key register for i ∈ [15].…”
Section: Leakage Modelsmentioning
confidence: 99%
See 3 more Smart Citations