New Type of Collision Attack on Power-Analysis Resistant AES


KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 9, pp. 393-398, Sep. 2013
10.3745/KTCCS.2013.2.9.393,   PDF Download:

Abstract

This paper introduces a new collision attack on first-order masked AES. This attack is a known plaintext attack, while the existing collision attacks are a chosen plaintext attack. In addition, our method is more efficient than the second-order power analysis and requires about 1/27.5 power measurements by comparison with the last collision attack. Some experiment results of this paper support this fact. In this paper, we also introduce a simple countermeasure, which can protect against our attack.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
H. S. Kim, H. S. Park, S. H. Hong, "New Type of Collision Attack on Power-Analysis Resistant AES," KIPS Transactions on Computer and Communication Systems, vol. 2, no. 9, pp. 393-398, 2013. DOI: 10.3745/KTCCS.2013.2.9.393.

[ACM Style]
Hee Seok Kim, Hark Soo Park, and Seok Hie Hong. 2013. New Type of Collision Attack on Power-Analysis Resistant AES. KIPS Transactions on Computer and Communication Systems, 2, 9, (2013), 393-398. DOI: 10.3745/KTCCS.2013.2.9.393.