Di erential Cluster Analysis ?
نویسندگان
چکیده
We propose a new technique called Di erential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions and it combines features from previously known collision attacks and Di erential Power Analysis. It captures more general leakage features and can be applied to algorithmic collisions as well as implementation speci c collisions. In addition, the concept is inherently multivariate. Various applications of the approach are possible: with and without power consumption model and single as well as multi-bit leakage can be exploited. Our ndings are con rmed by practical results on two platforms: an AVR microcontroller with implemented DES algorithm and an AES hardware module. To our best knowledge, this is the rst work demonstrating the feasibility of internal collision attacks on highly parallel hardware platforms. Furthermore, we present a new attack strategy for the targeted AES hardware module.
منابع مشابه
Numerical Solution of fuzzy differential equations of nth-order by Adams-Bashforth method
So far, many methods have been presented to solve the rst-order di erential equations. But, not many studies have been conducted for numerical solution of high-order fuzzy di erential equations. In this research, First, the equation by reducing time, we transform the rst-order equation. Then we have applied Adams-Bashforth multi-step methods for the initial approximation of one order di erentia...
متن کاملSystems of Diierential Delay Equations I: Floquet Multipliers and Discrete Lyapunov Functions
We de ne a discrete (integer-valued) Lyapunov function V for cyclic nearest neighbor systems of di erential delay equations possessing a feedback condition. This extends analogous de nitions for cyclic systems of ODE's, and for scalar di erential delay equations. We relate the values of V to the real parts of the Floquet multipliers for such linear periodic systems, and thereby prove all Floque...
متن کاملDiierential Elimination-completion Algorithms for Dae and Pdae
dae and pdae are systems of ordinary and partial di erential-algebraic equations with constraints. They occur frequently in applications such as constrained multibody mechanics, space-craft control and incompressible uid dynamics. A dae has di erential index r if a minimum of r+1 di erentiations of it are required before no new constraints are obtained. While dae of low di erential index (0 or ...
متن کاملRelationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2
We propose a new method for evaluating the security of block ciphers against di erential cryptanalysis and propose new structures for block ciphers. To this end, we de ne the word-wise Markov (Feistel) cipher and random output-di erential (Feistel) cipher and clarify the relations among the di erential, the truncated di erential and the impossible di erential cryptanalyses of the random output-...
متن کاملMarkov Ciphers and Diierential Cryptanalysis
This paper considers the security of iterated block ciphers against the di erential cryptanalysis introduced by Biham and Shamir Di erential cryptanalysis is a chosen plaintext attack on secret key block ciphers that are based on iterating a cryptographically weak function r times e g the round Data Encryption Standard DES It is shown that the success of such attacks on an r round cipher depend...
متن کامل