Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/147419
Title: | Practical reverse engineering of secret Sboxes by side-channel analysis | Authors: | Jap, Dirmanto Bhasin, Shivam |
Keywords: | Engineering::Computer science and engineering | Issue Date: | 2020 | Source: | Jap, D. & Bhasin, S. (2020). Practical reverse engineering of secret Sboxes by side-channel analysis. 2020 IEEE International Symposium On Circuits and Systems (ISCAS), 1-5. https://dx.doi.org/10.1109/ISCAS45731.2020.9180848 | Conference: | 2020 IEEE International Symposium on Circuits and Systems (ISCAS) | Abstract: | Although security by obscurity has been proven useless for years, it is still used in some application, such as industry or government agencies. In this paper, we demonstrate practical recovery of substitution box (Sbox) from secret AES-like ciphers by side-channel analysis for reverse engineering or SCARE. By detecting side-channel collision, one can determine the Sbox mapping in an iterative manner. The Sbox recovery is demonstrated with practical measurements from a commercial microcontroller. Three different collision techniques are tested and with all the three techniques, the secret Sbox is recovered with high success. | URI: | https://hdl.handle.net/10356/147419 | ISBN: | 978-1-7281-3320-1 | ISSN: | 2158-1525 | DOI: | 10.1109/ISCAS45731.2020.9180848 | Research Centres: | Temasek Laboratories @ NTU | Rights: | © 2020 Institute of Electrical and Electronics Engineers (IEEE). All rights reserved. | Fulltext Permission: | none | Fulltext Availability: | No Fulltext |
Appears in Collections: | TL Conference Papers |
SCOPUSTM
Citations
50
3
Updated on Mar 13, 2025
Page view(s)
326
Updated on Mar 18, 2025
Google ScholarTM
Check
Altmetric
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.