Side-channel analysis against SecOC-compliant AES-CMAC

نویسندگان

چکیده

This study presents a side-channel analysis (SCA) attack for AES-CMAC, which is used in the controller area network (CAN) protocol in-vehicle networks. It difficult to apply conventional SCAs that focus on single round of Sboxes as case AES-CMAC/CTR because AES input values are unknown attacker owing its structure. The proposed method focuses first three rounds continuously and obtains secret key by sequentially estimating intermediate using first-order SCA. Our can be applied all versions Secure Onboard Communication (SecOC) standard securing CAN protocols. We deep-learning-based SCA implement attack, addition correlation power analysis. demonstrate effectiveness through an experiment AES-CMAC software implemented PASTA automotive security evaluation platform, compliant with SecOC defined AUTomotive Open System ARchitecture. results show successfully reveal at most 400,000 150 measurements non-profiling SCA, respectively.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tolerant Algebraic Side-Channel Analysis of AES

We report on a Tolerant Algebraic Side-Channel Analysis (TASCA) attack on an AES implementation, using an optimizing pseudoBoolean solver to recover the secret key from a vector of Hamming weights corresponding to a single encryption. We first develop a boundary on the maximum error rate that can be tolerated as a function of the set size output by the decoder and the number of measurements. Th...

متن کامل

Side-Channel Analysis Resistant Implementation of AES on Automotive Processors

iii Statement I hereby declare, that the work presented in this master thesis is my own work and that to the best of my knowledge it is original, except where indicated by references to other authors. Erklärung Hiermit versichere ich, dass ich meine Master Thesis selber verfasst und keine anderen als die angegebenen Quellen und Hilfsmittel benutzt, sowie Zitate kenntlich gemacht habe.

متن کامل

Algebraic Side-Channel Collision Attacks on AES

This paper presents a new powerful side-channel cryptanalytic method algebraic collision attacks representing an efficient class of power analysis being based on both the power consumption information leakage and specific structure of the attacked cryptographic algorithm. This can result in an extremely low measurement count needed for a key recovery. The algebraic collision attacks are well ap...

متن کامل

Improved Side-Channel Collision Attacks on AES

Side-channel collision attacks were proposed in [1] and applied to AES in [2]. These are based on detecting collisions in certain positions of the internal state after the first AES round for different executions of the algorithm. The attack needs about 40 measurements and 512 MB precomputed values as well as requires the chosen-plaintext possibility. In this paper we show how to mount a collis...

متن کامل

RFC 4493 The AES - CMAC Algorithm

The National Institute of Standards and Technology (NIST) has recently specified the Cipher-based Message Authentication Code (CMAC), which is equivalent to the One-Key CBC MAC1 (OMAC1) submitted by Iwata and Kurosawa. This memo specifies an authentication algorithm based on CMAC with the 128-bit Advanced Encryption Standard (AES). This new authentication algorithm is named AES-CMAC. The purpos...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Circuits and Systems Ii-express Briefs

سال: 2023

ISSN: ['1549-7747', '1558-3791']

DOI: https://doi.org/10.1109/tcsii.2023.3288278