2005
DOI: 10.1007/11496137_27
|View full text |Cite
|
Sign up to set email alerts
|

SCARE of the DES

Abstract: Side-Channel Analysis for Reverse Engineering (SCARE) is a new field of application for Side-Channel Attacks (SCA), that was recently introduced, following initial results on the GSM A3/A8 algorithm. The principle of SCARE is to use side-channel information (for instance, power consumption) as a tool to reverse-engineer some secret parts of a cryptographic implementation. SCARE has the advantage of being discrete and non-intrusive, so it appears to be a promising new direction of research.In this paper, we app… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

1
12
0

Year Published

2007
2007
2017
2017

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(13 citation statements)
references
References 9 publications
1
12
0
Order By: Relevance
“…This work was subsequently improved by Clavier [10] who described how to recover both s-boxes altogether with the secret key used by the cipher. In parallel to these results, Daudigny et al [13] showed that simple secret modifications of the DES cipher could also be recovered from side-channel observations. In a more recent work, Réal et al [27] took a closer look at Feistel schemes in a more general sense.…”
Section: Introductionsupporting
confidence: 48%
“…This work was subsequently improved by Clavier [10] who described how to recover both s-boxes altogether with the secret key used by the cipher. In parallel to these results, Daudigny et al [13] showed that simple secret modifications of the DES cipher could also be recovered from side-channel observations. In a more recent work, Réal et al [27] took a closer look at Feistel schemes in a more general sense.…”
Section: Introductionsupporting
confidence: 48%
“…These results were improved by [10]. [11] studies DES in this context and is extended to Unknown Hardware Feistel Implementation by [12]. Use of proprietary algorithms and the protection of their specifications can be conceived in organizations that can afford the risk of relying on secret algorithms such as military groups or pay-tv / mobile network operators.…”
Section: Introductionmentioning
confidence: 86%
“…The existing reverse engineering methods mainly include the mathematics‐based reverse analyses and SCA‐based reverse analyses . Invasive attack is another reverse analysis which reconfigures the logic circuits through different pairs of input and output.…”
Section: Introductionmentioning
confidence: 99%
“…Roman Novak firstly proposed a power analysis to recover the unknown S ‐box in A3/A8 algorithm , which is considered as the first work in SCARE. After several years, there have been more SCAREs against other algorithms at both hardware and software levels . In 2010, Sylvain Guilley proposed a new SCA, which is claimed to reverse any kind of algorithms .…”
Section: Introductionmentioning
confidence: 99%