Side-channel analysis against SecOC-compliant AES-CMAC
نویسندگان
چکیده
This study presents a side-channel analysis (SCA) attack for AES-CMAC, which is used in the controller area network (CAN) protocol in-vehicle networks. It difficult to apply conventional SCAs that focus on single round of Sboxes as case AES-CMAC/CTR because AES input values are unknown attacker owing its structure. The proposed method focuses first three rounds continuously and obtains secret key by sequentially estimating intermediate using first-order SCA. Our can be applied all versions Secure Onboard Communication (SecOC) standard securing CAN protocols. We deep-learning-based SCA implement attack, addition correlation power analysis. demonstrate effectiveness through an experiment AES-CMAC software implemented PASTA automotive security evaluation platform, compliant with SecOC defined AUTomotive Open System ARchitecture. results show successfully reveal at most 400,000 150 measurements non-profiling SCA, respectively.
منابع مشابه
Tolerant Algebraic Side-Channel Analysis of AES
We report on a Tolerant Algebraic Side-Channel Analysis (TASCA) attack on an AES implementation, using an optimizing pseudoBoolean solver to recover the secret key from a vector of Hamming weights corresponding to a single encryption. We first develop a boundary on the maximum error rate that can be tolerated as a function of the set size output by the decoder and the number of measurements. Th...
متن کاملSide-Channel Analysis Resistant Implementation of AES on Automotive Processors
iii Statement I hereby declare, that the work presented in this master thesis is my own work and that to the best of my knowledge it is original, except where indicated by references to other authors. Erklärung Hiermit versichere ich, dass ich meine Master Thesis selber verfasst und keine anderen als die angegebenen Quellen und Hilfsmittel benutzt, sowie Zitate kenntlich gemacht habe.
متن کاملAlgebraic Side-Channel Collision Attacks on AES
This paper presents a new powerful side-channel cryptanalytic method algebraic collision attacks representing an efficient class of power analysis being based on both the power consumption information leakage and specific structure of the attacked cryptographic algorithm. This can result in an extremely low measurement count needed for a key recovery. The algebraic collision attacks are well ap...
متن کاملImproved Side-Channel Collision Attacks on AES
Side-channel collision attacks were proposed in [1] and applied to AES in [2]. These are based on detecting collisions in certain positions of the internal state after the first AES round for different executions of the algorithm. The attack needs about 40 measurements and 512 MB precomputed values as well as requires the chosen-plaintext possibility. In this paper we show how to mount a collis...
متن کاملRFC 4493 The AES - CMAC Algorithm
The National Institute of Standards and Technology (NIST) has recently specified the Cipher-based Message Authentication Code (CMAC), which is equivalent to the One-Key CBC MAC1 (OMAC1) submitted by Iwata and Kurosawa. This memo specifies an authentication algorithm based on CMAC with the 128-bit Advanced Encryption Standard (AES). This new authentication algorithm is named AES-CMAC. The purpos...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Circuits and Systems Ii-express Briefs
سال: 2023
ISSN: ['1549-7747', '1558-3791']
DOI: https://doi.org/10.1109/tcsii.2023.3288278