2016
DOI: 10.4218/etrij.16.0114.0854
|View full text |Cite
|
Sign up to set email alerts
|

New Type of Collision Attack on First-Order Masked AESs

Abstract: This paper introduces a new type of collision attack on first‐order masked Advanced Encryption Standards. This attack is a known‐plaintext attack, while the existing collision attacks are chosen‐plaintext attacks. In addition, our method requires significantly fewer power measurements than any second‐order differential power analysis or existing collision attacks.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…The mainly handled data is the masking value. This phase is a good target for horizontal correlation attacks [29,30]. However, this attack can effectively cope with shuffling and dummy operations.…”
Section: Security Analysis and Soundness Of Algorithmmentioning
confidence: 99%
“…The mainly handled data is the masking value. This phase is a good target for horizontal correlation attacks [29,30]. However, this attack can effectively cope with shuffling and dummy operations.…”
Section: Security Analysis and Soundness Of Algorithmmentioning
confidence: 99%
“…As an international block cipher algorithm, AES is widely used in the field of information security for its high key sensitivity, short build time and low memory requirements. However, the Collision Attack (CA) technology developed in recent years can quickly recover the key of AES, and has brought great challenges to the security of AES circuits [1,2,3,4,5,6,7,8,9].…”
Section: Introductionmentioning
confidence: 99%
“…These attacks pose a very serious threat to embedded systems with cryptographic algorithms. There has been a great deal of effort put into finding various SCAs and developing secure counter-measures, recently [3][4][5][6][7][8][9][10][11][12][13][14][15][16].This special issue has been organized to provide a possibility for researchers in the area of SCAs to highlight the most recent and exciting technologies. The research papers selected for this special issue represent recent progress in the field, including power analysis attacks [17][18][19], cache-based timing attacks , system-level counter-measures [42][43][44][45][46][47][48], and so on [49][50][51][52][53][54][55][56][57][58][59][60].…”
mentioning
confidence: 99%
“…These attacks pose a very serious threat to embedded systems with cryptographic algorithms. There has been a great deal of effort put into finding various SCAs and developing secure counter-measures, recently [3][4][5][6][7][8][9][10][11][12][13][14][15][16].…”
mentioning
confidence: 99%