Benutzer: Gast  Login
Titel:

ASCA vs. SASCA - A Closer Look at the AES Key Schedule

Dokumenttyp:
Konferenzbeitrag
Autor(en):
Strieder, Emanuele and Ilg, Manuel and Heyszl, Johann and Unterstein, Florian and Streit, Silvan
Abstract:
We compare two key recovery methods for single trace attacks on the AES key schedule. The 2018 CHES capture-the-flag (CTF) challenge which includes an unprotected key schedule raises the question, which method performs best during key recovery: Soft Analytical Side-Channel Attacks (SASCAs) or Algebraic Side-Channel Attacks (ASCAs). SASCAs as well as ASCAs exploit knowledge about the attacked algorithm by leakage recombination and allow for a computationally efficient key recovery based on...     »
Stichworte:
SASCA · ASCA · Belief Propagation · SAT · AES · Key Schedule · Key Expansion
Dewey-Dezimalklassifikation:
620 Ingenieurwissenschaften
Herausgeber:
Kavun, Elif Bilge and Pehl, Michael
Kongress- / Buchtitel:
Constructive Side-Channel Analysis and Secure Design - 14th International Workshop, COSADE 2023, Munich, Germany, April 3-4, 2023, Proceedings
Kongress / Zusatzinformationen:
München
Band / Teilband / Volume:
13979
Verlag / Institution:
Springer
Jahr:
2023
Quartal:
2. Quartal
Jahr / Monat:
2023-04
Monat:
Apr
Seiten:
65--85
Serientitel:
Lecture Notes in Computer Science
Reviewed:
ja
Sprache:
en
Volltext / DOI:
doi:10.1007/978-3-031-29497-6_4
WWW:
https://doi.org/10.1007/978-3-031-29497-6_4
 BibTeX