Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/160239
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ou, Changhai | en_US |
dc.contributor.author | Lam, Siew-Kei | en_US |
dc.contributor.author | Jiang, Guiyuan | en_US |
dc.date.accessioned | 2022-07-18T03:00:40Z | - |
dc.date.available | 2022-07-18T03:00:40Z | - |
dc.date.issued | 2020 | - |
dc.identifier.citation | Ou, C., Lam, S. & Jiang, G. (2020). The science of guessing in collision-optimized divide-and-conquer attacks. IEEE Transactions On Computer-Aided Design of Integrated Circuits and Systems, 40(6), 1039-1051. https://dx.doi.org/10.1109/TCAD.2020.3031243 | en_US |
dc.identifier.issn | 0278-0070 | en_US |
dc.identifier.uri | https://hdl.handle.net/10356/160239 | - |
dc.description.abstract | Recovering keys ranked in very deep candidate space efficiently is a very important but challenging issue in side-channel attacks (SCAs). State-of-the-art collision-optimized divide-and-conquer attacks (CODCAs) extract collision information from a collision attack to optimize the key recovery of a divide-and-conquer attack, and transform the very huge guessing space to a much smaller collision space. However, the inefficient collision detection makes them time consuming. The very limited collisions exploited and large performance difference between the collision attack and the divide-and-conquer attack in CODCAs also prevent their application in much larger spaces. In this article, we propose a Minkowski distance enhanced collision attack (MDCA) with performance closer to template attack (TA) compared to traditional correlation-enhanced collision attack (CECA), thus making the optimization more practical and meaningful. Next, we build a more advanced CODCA named full-collision chain (FCC) from TA and MDCA to exploit all collisions. Moreover, to minimize the thresholds while guaranteeing a high success probability of key recovery, we propose a fault-tolerant scheme to optimize FCC. The full key is divided into several big 'blocks,' on which a fault-tolerant vector (FTV) is exploited to flexibly adjust its chain space. Finally, guessing theory is exploited to optimize thresholds determination and search order of subkeys. Experimental results show that FCC notably outperforms the existing CODCAs. | en_US |
dc.description.sponsorship | National Research Foundation (NRF) | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartof | IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems | en_US |
dc.rights | © 2020 IEEE. All rights reserved. | en_US |
dc.subject | Engineering::Computer science and engineering | en_US |
dc.title | The science of guessing in collision-optimized divide-and-conquer attacks | en_US |
dc.type | Journal Article | en |
dc.contributor.school | School of Computer Science and Engineering | en_US |
dc.contributor.research | Hardware & Embedded Systems Lab (HESL) | en_US |
dc.identifier.doi | 10.1109/TCAD.2020.3031243 | - |
dc.identifier.scopus | 2-s2.0-85106626822 | - |
dc.identifier.issue | 6 | en_US |
dc.identifier.volume | 40 | en_US |
dc.identifier.spage | 1039 | en_US |
dc.identifier.epage | 1051 | en_US |
dc.subject.keywords | Collision Attack | en_US |
dc.subject.keywords | Divide and Conquer | en_US |
dc.description.acknowledgement | This work was supported in part by the National Research Foundation Singapore Under Its Campus for Research Excellence and Technological Enterprise Programme with the Technical University of Munich at TUMCREATE. | en_US |
item.grantfulltext | none | - |
item.fulltext | No Fulltext | - |
Appears in Collections: | SCSE Journal Articles |
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.