The Science of Guessing in Collision-Optimized Divide-and-Conquer Attacks

Recovering keys ranked in very deep candidate space efficiently is a very important but challenging issue in side-channel attacks (SCAs). State-of-the-art collision-optimized divide-and-conquer attacks (CODCAs) extract collision information from a collision attack to optimize the key recovery of a d...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on computer-aided design of integrated circuits and systems 2021-06, Vol.40 (6), p.1039-1051
Hauptverfasser: Ou, Changhai, Lam, Siew-Kei, Jiang, Guiyuan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1051
container_issue 6
container_start_page 1039
container_title IEEE transactions on computer-aided design of integrated circuits and systems
container_volume 40
creator Ou, Changhai
Lam, Siew-Kei
Jiang, Guiyuan
description Recovering keys ranked in very deep candidate space efficiently is a very important but challenging issue in side-channel attacks (SCAs). State-of-the-art collision-optimized divide-and-conquer attacks (CODCAs) extract collision information from a collision attack to optimize the key recovery of a divide-and-conquer attack, and transform the very huge guessing space to a much smaller collision space. However, the inefficient collision detection makes them time consuming. The very limited collisions exploited and large performance difference between the collision attack and the divide-and-conquer attack in CODCAs also prevent their application in much larger spaces. In this article, we propose a Minkowski distance enhanced collision attack (MDCA) with performance closer to template attack (TA) compared to traditional correlation-enhanced collision attack (CECA), thus making the optimization more practical and meaningful. Next, we build a more advanced CODCA named full-collision chain (FCC) from TA and MDCA to exploit all collisions. Moreover, to minimize the thresholds while guaranteeing a high success probability of key recovery, we propose a fault-tolerant scheme to optimize FCC. The full key is divided into several big "blocks," on which a fault-tolerant vector (FTV) is exploited to flexibly adjust its chain space. Finally, guessing theory is exploited to optimize thresholds determination and search order of subkeys. Experimental results show that FCC notably outperforms the existing CODCAs.
doi_str_mv 10.1109/TCAD.2020.3031243
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2530113007</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9225704</ieee_id><sourcerecordid>2530113007</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-ced212c3325cdd2d11bf48900f31dff9388bccc42ad6fb7cd0bcb97a168630943</originalsourceid><addsrcrecordid>eNqNkMtOwzAQRS0EEqXwAYhNJJYoZcbOy8sqQKlUqQvK2kr8AJc2LnEKgq_HUSrYsppZ3DNXcwi5RJggAr9dldO7CQUKEwYMacKOyAg5y-MEUzwmI6B5EQPkcErOvF8DYJJSPiLz1auOnqTVjdSRM9Fsr723zUtkm6h0m4311jXxctfZrf3WKrqzH1bpuGpUXLrmfa_baNp1lXzz5-TEVBuvLw5zTJ4f7lflY7xYzubldBFLylkXS60oUskYTaVSVCHWJik4gGGojOGsKGopZUIrlZk6lwpqWfO8wqzIGPCEjcn1cHfXutDvO7F2-7YJlYKmDBBZeDOkcEjJ1nnfaiN2rd1W7ZdAEL0x0RsTvTFxMBaYm4H51LUzfpDyywFAltKc0yRs0KeL_6dL21VdMFm6fdMF9GpArdZ_CKc0zSFhP0J9hy4</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2530113007</pqid></control><display><type>article</type><title>The Science of Guessing in Collision-Optimized Divide-and-Conquer Attacks</title><source>IEEE Electronic Library (IEL)</source><creator>Ou, Changhai ; Lam, Siew-Kei ; Jiang, Guiyuan</creator><creatorcontrib>Ou, Changhai ; Lam, Siew-Kei ; Jiang, Guiyuan</creatorcontrib><description>Recovering keys ranked in very deep candidate space efficiently is a very important but challenging issue in side-channel attacks (SCAs). State-of-the-art collision-optimized divide-and-conquer attacks (CODCAs) extract collision information from a collision attack to optimize the key recovery of a divide-and-conquer attack, and transform the very huge guessing space to a much smaller collision space. However, the inefficient collision detection makes them time consuming. The very limited collisions exploited and large performance difference between the collision attack and the divide-and-conquer attack in CODCAs also prevent their application in much larger spaces. In this article, we propose a Minkowski distance enhanced collision attack (MDCA) with performance closer to template attack (TA) compared to traditional correlation-enhanced collision attack (CECA), thus making the optimization more practical and meaningful. Next, we build a more advanced CODCA named full-collision chain (FCC) from TA and MDCA to exploit all collisions. Moreover, to minimize the thresholds while guaranteeing a high success probability of key recovery, we propose a fault-tolerant scheme to optimize FCC. The full key is divided into several big "blocks," on which a fault-tolerant vector (FTV) is exploited to flexibly adjust its chain space. Finally, guessing theory is exploited to optimize thresholds determination and search order of subkeys. Experimental results show that FCC notably outperforms the existing CODCAs.</description><identifier>ISSN: 0278-0070</identifier><identifier>EISSN: 1937-4151</identifier><identifier>DOI: 10.1109/TCAD.2020.3031243</identifier><identifier>CODEN: ITCSDI</identifier><language>eng</language><publisher>PISCATAWAY: IEEE</publisher><subject>Chains ; Collision attack ; Collision avoidance ; Complexity theory ; Computer Science ; Computer Science, Hardware &amp; Architecture ; Computer Science, Interdisciplinary Applications ; Cryptography ; divide and conquer ; Engineering ; Engineering, Electrical &amp; Electronic ; Fault tolerance ; Fault tolerant systems ; FCC ; full-collision chain (FCC) ; key enumeration ; Optimization ; Recovery ; Registers ; Science &amp; Technology ; side-channel attack (SCA) ; Technology ; Thresholds</subject><ispartof>IEEE transactions on computer-aided design of integrated circuits and systems, 2021-06, Vol.40 (6), p.1039-1051</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>true</woscitedreferencessubscribed><woscitedreferencescount>1</woscitedreferencescount><woscitedreferencesoriginalsourcerecordid>wos000652792400003</woscitedreferencesoriginalsourcerecordid><citedby>FETCH-LOGICAL-c293t-ced212c3325cdd2d11bf48900f31dff9388bccc42ad6fb7cd0bcb97a168630943</citedby><cites>FETCH-LOGICAL-c293t-ced212c3325cdd2d11bf48900f31dff9388bccc42ad6fb7cd0bcb97a168630943</cites><orcidid>0000-0001-9679-6223 ; 0000-0002-1398-821X ; 0000-0002-8346-2635</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9225704$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>315,782,786,798,27931,27932,39265,54765</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9225704$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Ou, Changhai</creatorcontrib><creatorcontrib>Lam, Siew-Kei</creatorcontrib><creatorcontrib>Jiang, Guiyuan</creatorcontrib><title>The Science of Guessing in Collision-Optimized Divide-and-Conquer Attacks</title><title>IEEE transactions on computer-aided design of integrated circuits and systems</title><addtitle>TCAD</addtitle><addtitle>IEEE T COMPUT AID D</addtitle><description>Recovering keys ranked in very deep candidate space efficiently is a very important but challenging issue in side-channel attacks (SCAs). State-of-the-art collision-optimized divide-and-conquer attacks (CODCAs) extract collision information from a collision attack to optimize the key recovery of a divide-and-conquer attack, and transform the very huge guessing space to a much smaller collision space. However, the inefficient collision detection makes them time consuming. The very limited collisions exploited and large performance difference between the collision attack and the divide-and-conquer attack in CODCAs also prevent their application in much larger spaces. In this article, we propose a Minkowski distance enhanced collision attack (MDCA) with performance closer to template attack (TA) compared to traditional correlation-enhanced collision attack (CECA), thus making the optimization more practical and meaningful. Next, we build a more advanced CODCA named full-collision chain (FCC) from TA and MDCA to exploit all collisions. Moreover, to minimize the thresholds while guaranteeing a high success probability of key recovery, we propose a fault-tolerant scheme to optimize FCC. The full key is divided into several big "blocks," on which a fault-tolerant vector (FTV) is exploited to flexibly adjust its chain space. Finally, guessing theory is exploited to optimize thresholds determination and search order of subkeys. Experimental results show that FCC notably outperforms the existing CODCAs.</description><subject>Chains</subject><subject>Collision attack</subject><subject>Collision avoidance</subject><subject>Complexity theory</subject><subject>Computer Science</subject><subject>Computer Science, Hardware &amp; Architecture</subject><subject>Computer Science, Interdisciplinary Applications</subject><subject>Cryptography</subject><subject>divide and conquer</subject><subject>Engineering</subject><subject>Engineering, Electrical &amp; Electronic</subject><subject>Fault tolerance</subject><subject>Fault tolerant systems</subject><subject>FCC</subject><subject>full-collision chain (FCC)</subject><subject>key enumeration</subject><subject>Optimization</subject><subject>Recovery</subject><subject>Registers</subject><subject>Science &amp; Technology</subject><subject>side-channel attack (SCA)</subject><subject>Technology</subject><subject>Thresholds</subject><issn>0278-0070</issn><issn>1937-4151</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><sourceid>HGBXW</sourceid><recordid>eNqNkMtOwzAQRS0EEqXwAYhNJJYoZcbOy8sqQKlUqQvK2kr8AJc2LnEKgq_HUSrYsppZ3DNXcwi5RJggAr9dldO7CQUKEwYMacKOyAg5y-MEUzwmI6B5EQPkcErOvF8DYJJSPiLz1auOnqTVjdSRM9Fsr723zUtkm6h0m4311jXxctfZrf3WKrqzH1bpuGpUXLrmfa_baNp1lXzz5-TEVBuvLw5zTJ4f7lflY7xYzubldBFLylkXS60oUskYTaVSVCHWJik4gGGojOGsKGopZUIrlZk6lwpqWfO8wqzIGPCEjcn1cHfXutDvO7F2-7YJlYKmDBBZeDOkcEjJ1nnfaiN2rd1W7ZdAEL0x0RsTvTFxMBaYm4H51LUzfpDyywFAltKc0yRs0KeL_6dL21VdMFm6fdMF9GpArdZ_CKc0zSFhP0J9hy4</recordid><startdate>20210601</startdate><enddate>20210601</enddate><creator>Ou, Changhai</creator><creator>Lam, Siew-Kei</creator><creator>Jiang, Guiyuan</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>BLEPL</scope><scope>DTL</scope><scope>HGBXW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-9679-6223</orcidid><orcidid>https://orcid.org/0000-0002-1398-821X</orcidid><orcidid>https://orcid.org/0000-0002-8346-2635</orcidid></search><sort><creationdate>20210601</creationdate><title>The Science of Guessing in Collision-Optimized Divide-and-Conquer Attacks</title><author>Ou, Changhai ; Lam, Siew-Kei ; Jiang, Guiyuan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-ced212c3325cdd2d11bf48900f31dff9388bccc42ad6fb7cd0bcb97a168630943</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Chains</topic><topic>Collision attack</topic><topic>Collision avoidance</topic><topic>Complexity theory</topic><topic>Computer Science</topic><topic>Computer Science, Hardware &amp; Architecture</topic><topic>Computer Science, Interdisciplinary Applications</topic><topic>Cryptography</topic><topic>divide and conquer</topic><topic>Engineering</topic><topic>Engineering, Electrical &amp; Electronic</topic><topic>Fault tolerance</topic><topic>Fault tolerant systems</topic><topic>FCC</topic><topic>full-collision chain (FCC)</topic><topic>key enumeration</topic><topic>Optimization</topic><topic>Recovery</topic><topic>Registers</topic><topic>Science &amp; Technology</topic><topic>side-channel attack (SCA)</topic><topic>Technology</topic><topic>Thresholds</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ou, Changhai</creatorcontrib><creatorcontrib>Lam, Siew-Kei</creatorcontrib><creatorcontrib>Jiang, Guiyuan</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Web of Science Core Collection</collection><collection>Science Citation Index Expanded</collection><collection>Web of Science - Science Citation Index Expanded - 2021</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on computer-aided design of integrated circuits and systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ou, Changhai</au><au>Lam, Siew-Kei</au><au>Jiang, Guiyuan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>The Science of Guessing in Collision-Optimized Divide-and-Conquer Attacks</atitle><jtitle>IEEE transactions on computer-aided design of integrated circuits and systems</jtitle><stitle>TCAD</stitle><stitle>IEEE T COMPUT AID D</stitle><date>2021-06-01</date><risdate>2021</risdate><volume>40</volume><issue>6</issue><spage>1039</spage><epage>1051</epage><pages>1039-1051</pages><issn>0278-0070</issn><eissn>1937-4151</eissn><coden>ITCSDI</coden><abstract>Recovering keys ranked in very deep candidate space efficiently is a very important but challenging issue in side-channel attacks (SCAs). State-of-the-art collision-optimized divide-and-conquer attacks (CODCAs) extract collision information from a collision attack to optimize the key recovery of a divide-and-conquer attack, and transform the very huge guessing space to a much smaller collision space. However, the inefficient collision detection makes them time consuming. The very limited collisions exploited and large performance difference between the collision attack and the divide-and-conquer attack in CODCAs also prevent their application in much larger spaces. In this article, we propose a Minkowski distance enhanced collision attack (MDCA) with performance closer to template attack (TA) compared to traditional correlation-enhanced collision attack (CECA), thus making the optimization more practical and meaningful. Next, we build a more advanced CODCA named full-collision chain (FCC) from TA and MDCA to exploit all collisions. Moreover, to minimize the thresholds while guaranteeing a high success probability of key recovery, we propose a fault-tolerant scheme to optimize FCC. The full key is divided into several big "blocks," on which a fault-tolerant vector (FTV) is exploited to flexibly adjust its chain space. Finally, guessing theory is exploited to optimize thresholds determination and search order of subkeys. Experimental results show that FCC notably outperforms the existing CODCAs.</abstract><cop>PISCATAWAY</cop><pub>IEEE</pub><doi>10.1109/TCAD.2020.3031243</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0001-9679-6223</orcidid><orcidid>https://orcid.org/0000-0002-1398-821X</orcidid><orcidid>https://orcid.org/0000-0002-8346-2635</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0278-0070
ispartof IEEE transactions on computer-aided design of integrated circuits and systems, 2021-06, Vol.40 (6), p.1039-1051
issn 0278-0070
1937-4151
language eng
recordid cdi_proquest_journals_2530113007
source IEEE Electronic Library (IEL)
subjects Chains
Collision attack
Collision avoidance
Complexity theory
Computer Science
Computer Science, Hardware & Architecture
Computer Science, Interdisciplinary Applications
Cryptography
divide and conquer
Engineering
Engineering, Electrical & Electronic
Fault tolerance
Fault tolerant systems
FCC
full-collision chain (FCC)
key enumeration
Optimization
Recovery
Registers
Science & Technology
side-channel attack (SCA)
Technology
Thresholds
title The Science of Guessing in Collision-Optimized Divide-and-Conquer Attacks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-04T16%3A43%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=The%20Science%20of%20Guessing%20in%20Collision-Optimized%20Divide-and-Conquer%20Attacks&rft.jtitle=IEEE%20transactions%20on%20computer-aided%20design%20of%20integrated%20circuits%20and%20systems&rft.au=Ou,%20Changhai&rft.date=2021-06-01&rft.volume=40&rft.issue=6&rft.spage=1039&rft.epage=1051&rft.pages=1039-1051&rft.issn=0278-0070&rft.eissn=1937-4151&rft.coden=ITCSDI&rft_id=info:doi/10.1109/TCAD.2020.3031243&rft_dat=%3Cproquest_RIE%3E2530113007%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2530113007&rft_id=info:pmid/&rft_ieee_id=9225704&rfr_iscdi=true