User: Guest  Login
Title:

ASCA vs. SASCA - A Closer Look at the AES Key Schedule

Document type:
Konferenzbeitrag
Author(s):
Strieder, Emanuele and Ilg, Manuel and Heyszl, Johann and Unterstein, Florian and Streit, Silvan
Abstract:
We compare two key recovery methods for single trace attacks on the AES key schedule. The 2018 CHES capture-the-flag (CTF) challenge which includes an unprotected key schedule raises the question, which method performs best during key recovery: Soft Analytical Side-Channel Attacks (SASCAs) or Algebraic Side-Channel Attacks (ASCAs). SASCAs as well as ASCAs exploit knowledge about the attacked algorithm by leakage recombination and allow for a computationally efficient key recovery based on...     »
Keywords:
SASCA · ASCA · Belief Propagation · SAT · AES · Key Schedule · Key Expansion
Dewey Decimal Classification:
620 Ingenieurwissenschaften
Editor:
Kavun, Elif Bilge and Pehl, Michael
Book / Congress title:
Constructive Side-Channel Analysis and Secure Design - 14th International Workshop, COSADE 2023, Munich, Germany, April 3-4, 2023, Proceedings
Congress (additional information):
München
Volume:
13979
Publisher:
Springer
Year:
2023
Quarter:
2. Quartal
Year / month:
2023-04
Month:
Apr
Pages:
65--85
Bookseries title:
Lecture Notes in Computer Science
Reviewed:
ja
Language:
en
Fulltext / DOI:
doi:10.1007/978-3-031-29497-6_4
WWW:
https://doi.org/10.1007/978-3-031-29497-6_4
 BibTeX