Skip to main content

Near and Far Collision Attack on Masked AES

  • Conference paper
  • First Online:
The 10th International Conference on Computer Engineering and Networks (CENet 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1274))

Included in the following conference series:

  • 1953 Accesses

Abstract

Collision attack is an effective method in the field of side-channel analysis to crack cryptographic algorithms, and masking can be used as a countermeasure. Most collision attacks only utilize the traces that will collide. In this paper, we propose a collision attack method that exploits not only traces tending to collide, but also non-colliding traces. It can bring higher efficiency and reduce the number of needed traces significantly. In addition, our method is a random-plaintext collision attack method instead of a chosen-plaintext attack. The experimental results show that our proposed approach is better than the existing collision-correlation attack proposed by Clavier et al. at CHES 2011 [11]. To achieve a high key recovery success rate at 80%, we use at least 60% less traces than collision-correlation attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kocher, P.C., Jaffe, J.M., June, B.C.: DES and other cryptographic processes with leak minimization for smartcards and other CryptoSystems, Journal = US Patent 6,278,783 (1998)

    Google Scholar 

  2. Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)

    Google Scholar 

  3. Schramm, K., Wollinger, T., Paar, C.: A new class of collision attacks and its application to DES. In: Proceedings of 10th International Workshop on Fast Software Encryption, Lund, pp. 206–222 (2003)

    Google Scholar 

  4. Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: International Workshop Cryptographic Hardware Embedded System, pp. 16–29. Springer, Berlin (2004)

    Google Scholar 

  5. Chari, S., Rao, J., Rohatgi, P.: Template attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13–28. Springer, Heidelberg (2003)

    Google Scholar 

  6. Bogdanov, A.: Improved side-channel collision attacks on AES. In: Proceedings of 14th International Workshop on Selected Areas in Cryptography, Ottawa, pp. 84–95 (2007)

    Google Scholar 

  7. Bogdanov, A.: Multiple-differential side-channel collision attacks on AES. In: Proceedings of 10th Workshop on Cryptographic Hardware and Embedded Systems, Washington, pp. 30–44 (2008)

    Google Scholar 

  8. Bogdanov, A., Kizhvatov, I.: Beyond the limits of DPA: combined side-channel collision attacks. IEEE Trans. Comput. 61(8), 1153–1164 (2012)

    Article  MathSciNet  Google Scholar 

  9. Ren, Y., Wu, L., Wang, A.: Double sieve collision attack based on bitwise detection. Ksii Trans. Internet Inf. Syst. 9(1), 296–308 (2015)

    Google Scholar 

  10. Moradi, A., Mischke, O., Eisenbarth, T.: Correlation-enhanced power analysis collision attack. In: Proceedings of 12th Workshop on Cryptographic Hardware and Embedded Systems, Santa Barbara, pp. 125–139 (2010)

    Google Scholar 

  11. Clavier, C., Feix, B., Gagnerot, G., et al.: Improved collision-correlation power analysis on first order protected AES. In: Proceedings of 13th Workshop on Cryptographic Hardware and Embedded Systems, Nara, pp. 49–62 (2011)

    Google Scholar 

  12. Wang, A., Zhang, Y., Tian, W., et al.: Right or wrong collision rate analysis without profiling: Full-automatic collision fault attack. Sci. China (Inf. Sci.) 61(3), 032101 (2018)

    Article  Google Scholar 

  13. Herbst, C., Oswald, E., Mangard, S.: An AES smart card implementation resistant to power analysis attacks. In: Proceedings of 4th International Conference on Applied Cryptography and Network Security, Singapore, pp. 239–252 (2006)

    Google Scholar 

Download references

Acknowledgement

This work is supported by Beijing Natural Science Foundation (No. 4202070), National Natural Science Foundation of China (Nos. 61872040, U1836101, 61871037), National Cryptography Development Fund (No. MMJJ20170201), Henan Key Laboratory of Network Cryptography Technology (No. LNCT2019-A02).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Yongchuan Niu or An Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, X., Niu, Y., Tang, Q., Zhang, J., Ding, Y., Wang, A. (2021). Near and Far Collision Attack on Masked AES. In: Liu, Q., Liu, X., Shen, T., Qiu, X. (eds) The 10th International Conference on Computer Engineering and Networks. CENet 2020. Advances in Intelligent Systems and Computing, vol 1274. Springer, Singapore. https://doi.org/10.1007/978-981-15-8462-6_93

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-8462-6_93

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-8461-9

  • Online ISBN: 978-981-15-8462-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics