MDASCA: an enhanced algebraic side-channel attack for error tolerance and new leakage model exploitation

  • Authors:
  • Xinjie Zhao;Fan Zhang;Shize Guo;Tao Wang;Zhijie Shi;Huiying Liu;Keke Ji

  • Affiliations:
  • Ordnance Engineering College, Shijiazhuang, Hebei, China;University of Connecticut, Storrs, Connecticut;The Institute of North Electronic Equipment, Beijing, China;Ordnance Engineering College, Shijiazhuang, Hebei, China;University of Connecticut, Storrs, Connecticut;Ordnance Engineering College, Shijiazhuang, Hebei, China;Ordnance Engineering College, Shijiazhuang, Hebei, China

  • Venue:
  • COSADE'12 Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Algebraic side-channel attack (ASCA) is a powerful cryptanalysis technique different from conventional side-channel attacks. This paper studies ASCA from three aspects: enhancement, analysis and application. To enhance ASCA, we propose a generic method, called Multiple Deductions-based ASCA (MDASCA), to cope the multiple deductions caused by inaccurate measurements or interferences. For the first time, we show that ASCA can exploit cache leakage models. We analyze the attacks and estimate the minimal amount of leakages required for a successful ASCA on AES under different leakage models. In addition, we apply MDASCA to attack AES on an 8-bit microcontroller under Hamming weight leakage model, on two typical microprocessors under access driven cache leakage model, and on a 32-bit ARM microprocessor under trace driven cache leakage model. Many better results are achieved compared to the previous work. The results are also consistent with the theoretical analysis. Our work shows that MDASCA poses great threats with its excellence in error tolerance and new leakage model exploitation.