Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/147419
Title: Practical reverse engineering of secret Sboxes by side-channel analysis
Authors: Jap, Dirmanto
Bhasin, Shivam
Keywords: Engineering::Computer science and engineering
Issue Date: 2020
Source: Jap, D. & Bhasin, S. (2020). Practical reverse engineering of secret Sboxes by side-channel analysis. 2020 IEEE International Symposium On Circuits and Systems (ISCAS), 1-5. https://dx.doi.org/10.1109/ISCAS45731.2020.9180848
Conference: 2020 IEEE International Symposium on Circuits and Systems (ISCAS)
Abstract: Although security by obscurity has been proven useless for years, it is still used in some application, such as industry or government agencies. In this paper, we demonstrate practical recovery of substitution box (Sbox) from secret AES-like ciphers by side-channel analysis for reverse engineering or SCARE. By detecting side-channel collision, one can determine the Sbox mapping in an iterative manner. The Sbox recovery is demonstrated with practical measurements from a commercial microcontroller. Three different collision techniques are tested and with all the three techniques, the secret Sbox is recovered with high success.
URI: https://hdl.handle.net/10356/147419
ISBN: 978-1-7281-3320-1
ISSN: 2158-1525
DOI: 10.1109/ISCAS45731.2020.9180848
Research Centres: Temasek Laboratories @ NTU 
Rights: © 2020 Institute of Electrical and Electronics Engineers (IEEE). All rights reserved.
Fulltext Permission: none
Fulltext Availability: No Fulltext
Appears in Collections:TL Conference Papers

SCOPUSTM   
Citations 50

3
Updated on Mar 13, 2025

Page view(s)

326
Updated on Mar 18, 2025

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.