{"title":"基于强化的分而治之的侧信道攻击策略","authors":"Shan Jin, R. Bettati","doi":"10.1109/WIFS49906.2020.9360908","DOIUrl":null,"url":null,"abstract":"Previous works have proven that power consumption side-channel attacks, such as the Template Attack and the Stochastic Model, are effective for small secrets, such as those with 8 or 16 bits. However, directly applying those side-channel attacks on systems with large secrets, for example AES 128, is computationally intractable. Attackers usually apply a divide-and-conquer strategy to partition the secret in order to scale to larger numbers of bits. In the case of AES, divide-and-conquer strategy based side-channel attacks are usually launched on either the first round or the last round of the AES encryption. In this paper, we propose an efficient and pragmatic attack strategy that exploits the samples from multiple rounds, which significantly improves the key recovery compared to standard divide-and-conquer strategies.","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Reinforcement-Based Divide-and-Conquer Strategy for Side-Channel Attacks\",\"authors\":\"Shan Jin, R. Bettati\",\"doi\":\"10.1109/WIFS49906.2020.9360908\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Previous works have proven that power consumption side-channel attacks, such as the Template Attack and the Stochastic Model, are effective for small secrets, such as those with 8 or 16 bits. However, directly applying those side-channel attacks on systems with large secrets, for example AES 128, is computationally intractable. Attackers usually apply a divide-and-conquer strategy to partition the secret in order to scale to larger numbers of bits. In the case of AES, divide-and-conquer strategy based side-channel attacks are usually launched on either the first round or the last round of the AES encryption. In this paper, we propose an efficient and pragmatic attack strategy that exploits the samples from multiple rounds, which significantly improves the key recovery compared to standard divide-and-conquer strategies.\",\"PeriodicalId\":354881,\"journal\":{\"name\":\"2020 IEEE International Workshop on Information Forensics and Security (WIFS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE International Workshop on Information Forensics and Security (WIFS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WIFS49906.2020.9360908\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WIFS49906.2020.9360908","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Reinforcement-Based Divide-and-Conquer Strategy for Side-Channel Attacks
Previous works have proven that power consumption side-channel attacks, such as the Template Attack and the Stochastic Model, are effective for small secrets, such as those with 8 or 16 bits. However, directly applying those side-channel attacks on systems with large secrets, for example AES 128, is computationally intractable. Attackers usually apply a divide-and-conquer strategy to partition the secret in order to scale to larger numbers of bits. In the case of AES, divide-and-conquer strategy based side-channel attacks are usually launched on either the first round or the last round of the AES encryption. In this paper, we propose an efficient and pragmatic attack strategy that exploits the samples from multiple rounds, which significantly improves the key recovery compared to standard divide-and-conquer strategies.