Please use this identifier to cite or link to this item:
|Title:||Practical reverse engineering of secret Sboxes by side-channel analysis||Authors:||Jap, Dirmanto
|Keywords:||Engineering::Computer science and engineering||Issue Date:||2020||Source:||Jap, D. & Bhasin, S. (2020). Practical reverse engineering of secret Sboxes by side-channel analysis. 2020 IEEE International Symposium On Circuits and Systems (ISCAS), 1-5. https://dx.doi.org/10.1109/ISCAS45731.2020.9180848||Abstract:||Although security by obscurity has been proven useless for years, it is still used in some application, such as industry or government agencies. In this paper, we demonstrate practical recovery of substitution box (Sbox) from secret AES-like ciphers by side-channel analysis for reverse engineering or SCARE. By detecting side-channel collision, one can determine the Sbox mapping in an iterative manner. The Sbox recovery is demonstrated with practical measurements from a commercial microcontroller. Three different collision techniques are tested and with all the three techniques, the secret Sbox is recovered with high success.||URI:||https://hdl.handle.net/10356/147419||ISBN:||978-1-7281-3320-1||ISSN:||2158-1525||DOI:||10.1109/ISCAS45731.2020.9180848||Rights:||© 2020 Institute of Electrical and Electronics Engineers (IEEE). All rights reserved.||Fulltext Permission:||none||Fulltext Availability:||No Fulltext|
|Appears in Collections:||TL Conference Papers|
Updated on May 15, 2022
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.