Practical template-algebraic side channel attacks with extremely low data complexity

  • Authors:
  • Yossef Oren;Ofir Weisse;Avishai Wool

  • Affiliations:
  • Tel-Aviv University, Ramat Aviv, Israel;Tel-Aviv University, Ramat Aviv, Israel;Tel-Aviv University, Ramat Aviv, Israel

  • Venue:
  • Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Template-based Tolerant Algebraic Side Channel Attacks (Template-TASCA) were suggested in [20] as a way of reducing the high data complexity of template attacks by coupling them with algebraic side-channel attacks. In contrast to the maximum-likelihood method used in a standard template attack, the template-algebraic attack method uses a constraint solver to find the optimal state correlated to the measured side-channel leakage. In this work we present the first application of the template-algebraic key recovery attack to a publicly available data set (IAIK WS2). We show how our attack can successfully recover the encryption key even when the attacker has extremely limited access to the device under test -- only 200 traces in the offline phase and as little as a single trace in the online phase.