Wide Collisions in Practice
Detecting collisions in the power consumption of a modern cryptographic engine is usually difficult due to small leakages and possible countermeasures. Wide collisions offer a much stronger leakage that significantly facilitates their detection. This is the first time wide collisions are exploited in a power analysis attack. In this work we introduce a collision detection method based on the detection of characteristic outliers. Detection results are compared to optimized subspace-based templates. We show that the outlier detection method, while not requiring a template building phase, is almost as effective in detecting collisions as the template-based approach.
KeywordsRecognition Rate Collision Detection Collision Pair Collision Attack Power Trace
Unable to display preview. Download preview PDF.
- 5.Bogdanov, A., Kizhvatov, I.: Beyond the Limits of DPA: Combined Side-Channel Collision Attacks. IEEE Transactions on Computers PP(99), 1 (2011)Google Scholar
- 10.Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)Google Scholar
- 11.Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smartcards. Springer (2007)Google Scholar