Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores

Published: 01 September 2013 Publication History

Abstract

When complex functions, for example, substitution boxes of block ciphers, are realized in hardware, timing attributes of the underlying combinational circuit depend on the input/output changes of the function. These characteristics can be exploited by the help of a relatively new scheme called fault sensitivity analysis. A collision timing attack which exploits the data-dependent timing characteristics of combinational circuits is demonstrated in this paper. The attack is based on an also recently published correlation collision attack, which avoids the need for a hypothetical timing model for the underlying combinational circuit to recover the secret materials. The target platforms of our proposed attack are 14 AES ASIC cores of the SASEBO LSI chips in three different process technologies, 13 nm, 90 nm, and 65 nm. Successfully breaking all cores including the DPA-protected and fault attack protected cores indicates the strength of the attack.

Cited By

View all
  • (2023)New Approaches of Side-Channel Attacks Based on Chip Testing MethodsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2022.320770942:5(1411-1424)Online publication date: 1-May-2023
  • (2021)Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic CodeProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3485380(685-699)Online publication date: 12-Nov-2021
  • (2020)Impeccable CircuitsIEEE Transactions on Computers10.1109/TC.2019.294861769:3(361-376)Online publication date: 7-Feb-2020
  • Show More Cited By

Index Terms

  1. One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image IEEE Transactions on Computers
          IEEE Transactions on Computers  Volume 62, Issue 9
          September 2013
          222 pages

          Publisher

          IEEE Computer Society

          United States

          Publication History

          Published: 01 September 2013

          Author Tags

          1. AES
          2. ASIC
          3. Application specific integrated circuits
          4. Circuit faults
          5. Clocks
          6. Combinational circuits
          7. Correlation
          8. Encryption
          9. Index Terms â Side-channel attack
          10. Timing
          11. collision attack
          12. fault attack
          13. fault sensitivity attack
          14. timing attack

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 14 Oct 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2023)New Approaches of Side-Channel Attacks Based on Chip Testing MethodsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2022.320770942:5(1411-1424)Online publication date: 1-May-2023
          • (2021)Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic CodeProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3485380(685-699)Online publication date: 12-Nov-2021
          • (2020)Impeccable CircuitsIEEE Transactions on Computers10.1109/TC.2019.294861769:3(361-376)Online publication date: 7-Feb-2020
          • (2016)Side channel attack on NoC-based MPSoCs are practicalProceedings of the 29th Symposium on Integrated Circuits and Systems Design: Chip on the Mountains10.5555/3145862.3145877(1-6)Online publication date: 29-Aug-2016
          • (2016)Moments-Correlating DPAProceedings of the 2016 ACM Workshop on Theory of Implementation Security10.1145/2996366.2996369(5-15)Online publication date: 24-Oct-2016
          • (2016)A new zero value attack combined fault sensitivity analysis on masked AESMicroprocessors & Microsystems10.1016/j.micpro.2016.06.01445:PB(355-362)Online publication date: 1-Sep-2016

          View Options

          View options

          Get Access

          Login options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media