The Science of Guessing in Collision-Optimized Divide-and-Conquer Attacks
Recovering keys ranked in very deep candidate space efficiently is a very important but challenging issue in side-channel attacks (SCAs). State-of-the-art collision-optimized divide-and-conquer attacks (CODCAs) extract collision information from a collision attack to optimize the key recovery of a d...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on computer-aided design of integrated circuits and systems 2021-06, Vol.40 (6), p.1039-1051 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1051 |
---|---|
container_issue | 6 |
container_start_page | 1039 |
container_title | IEEE transactions on computer-aided design of integrated circuits and systems |
container_volume | 40 |
creator | Ou, Changhai Lam, Siew-Kei Jiang, Guiyuan |
description | Recovering keys ranked in very deep candidate space efficiently is a very important but challenging issue in side-channel attacks (SCAs). State-of-the-art collision-optimized divide-and-conquer attacks (CODCAs) extract collision information from a collision attack to optimize the key recovery of a divide-and-conquer attack, and transform the very huge guessing space to a much smaller collision space. However, the inefficient collision detection makes them time consuming. The very limited collisions exploited and large performance difference between the collision attack and the divide-and-conquer attack in CODCAs also prevent their application in much larger spaces. In this article, we propose a Minkowski distance enhanced collision attack (MDCA) with performance closer to template attack (TA) compared to traditional correlation-enhanced collision attack (CECA), thus making the optimization more practical and meaningful. Next, we build a more advanced CODCA named full-collision chain (FCC) from TA and MDCA to exploit all collisions. Moreover, to minimize the thresholds while guaranteeing a high success probability of key recovery, we propose a fault-tolerant scheme to optimize FCC. The full key is divided into several big "blocks," on which a fault-tolerant vector (FTV) is exploited to flexibly adjust its chain space. Finally, guessing theory is exploited to optimize thresholds determination and search order of subkeys. Experimental results show that FCC notably outperforms the existing CODCAs. |
doi_str_mv | 10.1109/TCAD.2020.3031243 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2530113007</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9225704</ieee_id><sourcerecordid>2530113007</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-ced212c3325cdd2d11bf48900f31dff9388bccc42ad6fb7cd0bcb97a168630943</originalsourceid><addsrcrecordid>eNqNkMtOwzAQRS0EEqXwAYhNJJYoZcbOy8sqQKlUqQvK2kr8AJc2LnEKgq_HUSrYsppZ3DNXcwi5RJggAr9dldO7CQUKEwYMacKOyAg5y-MEUzwmI6B5EQPkcErOvF8DYJJSPiLz1auOnqTVjdSRM9Fsr723zUtkm6h0m4311jXxctfZrf3WKrqzH1bpuGpUXLrmfa_baNp1lXzz5-TEVBuvLw5zTJ4f7lflY7xYzubldBFLylkXS60oUskYTaVSVCHWJik4gGGojOGsKGopZUIrlZk6lwpqWfO8wqzIGPCEjcn1cHfXutDvO7F2-7YJlYKmDBBZeDOkcEjJ1nnfaiN2rd1W7ZdAEL0x0RsTvTFxMBaYm4H51LUzfpDyywFAltKc0yRs0KeL_6dL21VdMFm6fdMF9GpArdZ_CKc0zSFhP0J9hy4</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2530113007</pqid></control><display><type>article</type><title>The Science of Guessing in Collision-Optimized Divide-and-Conquer Attacks</title><source>IEEE Electronic Library (IEL)</source><creator>Ou, Changhai ; Lam, Siew-Kei ; Jiang, Guiyuan</creator><creatorcontrib>Ou, Changhai ; Lam, Siew-Kei ; Jiang, Guiyuan</creatorcontrib><description>Recovering keys ranked in very deep candidate space efficiently is a very important but challenging issue in side-channel attacks (SCAs). State-of-the-art collision-optimized divide-and-conquer attacks (CODCAs) extract collision information from a collision attack to optimize the key recovery of a divide-and-conquer attack, and transform the very huge guessing space to a much smaller collision space. However, the inefficient collision detection makes them time consuming. The very limited collisions exploited and large performance difference between the collision attack and the divide-and-conquer attack in CODCAs also prevent their application in much larger spaces. In this article, we propose a Minkowski distance enhanced collision attack (MDCA) with performance closer to template attack (TA) compared to traditional correlation-enhanced collision attack (CECA), thus making the optimization more practical and meaningful. Next, we build a more advanced CODCA named full-collision chain (FCC) from TA and MDCA to exploit all collisions. Moreover, to minimize the thresholds while guaranteeing a high success probability of key recovery, we propose a fault-tolerant scheme to optimize FCC. The full key is divided into several big "blocks," on which a fault-tolerant vector (FTV) is exploited to flexibly adjust its chain space. Finally, guessing theory is exploited to optimize thresholds determination and search order of subkeys. Experimental results show that FCC notably outperforms the existing CODCAs.</description><identifier>ISSN: 0278-0070</identifier><identifier>EISSN: 1937-4151</identifier><identifier>DOI: 10.1109/TCAD.2020.3031243</identifier><identifier>CODEN: ITCSDI</identifier><language>eng</language><publisher>PISCATAWAY: IEEE</publisher><subject>Chains ; Collision attack ; Collision avoidance ; Complexity theory ; Computer Science ; Computer Science, Hardware & Architecture ; Computer Science, Interdisciplinary Applications ; Cryptography ; divide and conquer ; Engineering ; Engineering, Electrical & Electronic ; Fault tolerance ; Fault tolerant systems ; FCC ; full-collision chain (FCC) ; key enumeration ; Optimization ; Recovery ; Registers ; Science & Technology ; side-channel attack (SCA) ; Technology ; Thresholds</subject><ispartof>IEEE transactions on computer-aided design of integrated circuits and systems, 2021-06, Vol.40 (6), p.1039-1051</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>true</woscitedreferencessubscribed><woscitedreferencescount>1</woscitedreferencescount><woscitedreferencesoriginalsourcerecordid>wos000652792400003</woscitedreferencesoriginalsourcerecordid><citedby>FETCH-LOGICAL-c293t-ced212c3325cdd2d11bf48900f31dff9388bccc42ad6fb7cd0bcb97a168630943</citedby><cites>FETCH-LOGICAL-c293t-ced212c3325cdd2d11bf48900f31dff9388bccc42ad6fb7cd0bcb97a168630943</cites><orcidid>0000-0001-9679-6223 ; 0000-0002-1398-821X ; 0000-0002-8346-2635</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9225704$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>315,782,786,798,27931,27932,39265,54765</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9225704$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Ou, Changhai</creatorcontrib><creatorcontrib>Lam, Siew-Kei</creatorcontrib><creatorcontrib>Jiang, Guiyuan</creatorcontrib><title>The Science of Guessing in Collision-Optimized Divide-and-Conquer Attacks</title><title>IEEE transactions on computer-aided design of integrated circuits and systems</title><addtitle>TCAD</addtitle><addtitle>IEEE T COMPUT AID D</addtitle><description>Recovering keys ranked in very deep candidate space efficiently is a very important but challenging issue in side-channel attacks (SCAs). State-of-the-art collision-optimized divide-and-conquer attacks (CODCAs) extract collision information from a collision attack to optimize the key recovery of a divide-and-conquer attack, and transform the very huge guessing space to a much smaller collision space. However, the inefficient collision detection makes them time consuming. The very limited collisions exploited and large performance difference between the collision attack and the divide-and-conquer attack in CODCAs also prevent their application in much larger spaces. In this article, we propose a Minkowski distance enhanced collision attack (MDCA) with performance closer to template attack (TA) compared to traditional correlation-enhanced collision attack (CECA), thus making the optimization more practical and meaningful. Next, we build a more advanced CODCA named full-collision chain (FCC) from TA and MDCA to exploit all collisions. Moreover, to minimize the thresholds while guaranteeing a high success probability of key recovery, we propose a fault-tolerant scheme to optimize FCC. The full key is divided into several big "blocks," on which a fault-tolerant vector (FTV) is exploited to flexibly adjust its chain space. Finally, guessing theory is exploited to optimize thresholds determination and search order of subkeys. Experimental results show that FCC notably outperforms the existing CODCAs.</description><subject>Chains</subject><subject>Collision attack</subject><subject>Collision avoidance</subject><subject>Complexity theory</subject><subject>Computer Science</subject><subject>Computer Science, Hardware & Architecture</subject><subject>Computer Science, Interdisciplinary Applications</subject><subject>Cryptography</subject><subject>divide and conquer</subject><subject>Engineering</subject><subject>Engineering, Electrical & Electronic</subject><subject>Fault tolerance</subject><subject>Fault tolerant systems</subject><subject>FCC</subject><subject>full-collision chain (FCC)</subject><subject>key enumeration</subject><subject>Optimization</subject><subject>Recovery</subject><subject>Registers</subject><subject>Science & Technology</subject><subject>side-channel attack (SCA)</subject><subject>Technology</subject><subject>Thresholds</subject><issn>0278-0070</issn><issn>1937-4151</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><sourceid>HGBXW</sourceid><recordid>eNqNkMtOwzAQRS0EEqXwAYhNJJYoZcbOy8sqQKlUqQvK2kr8AJc2LnEKgq_HUSrYsppZ3DNXcwi5RJggAr9dldO7CQUKEwYMacKOyAg5y-MEUzwmI6B5EQPkcErOvF8DYJJSPiLz1auOnqTVjdSRM9Fsr723zUtkm6h0m4311jXxctfZrf3WKrqzH1bpuGpUXLrmfa_baNp1lXzz5-TEVBuvLw5zTJ4f7lflY7xYzubldBFLylkXS60oUskYTaVSVCHWJik4gGGojOGsKGopZUIrlZk6lwpqWfO8wqzIGPCEjcn1cHfXutDvO7F2-7YJlYKmDBBZeDOkcEjJ1nnfaiN2rd1W7ZdAEL0x0RsTvTFxMBaYm4H51LUzfpDyywFAltKc0yRs0KeL_6dL21VdMFm6fdMF9GpArdZ_CKc0zSFhP0J9hy4</recordid><startdate>20210601</startdate><enddate>20210601</enddate><creator>Ou, Changhai</creator><creator>Lam, Siew-Kei</creator><creator>Jiang, Guiyuan</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>BLEPL</scope><scope>DTL</scope><scope>HGBXW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-9679-6223</orcidid><orcidid>https://orcid.org/0000-0002-1398-821X</orcidid><orcidid>https://orcid.org/0000-0002-8346-2635</orcidid></search><sort><creationdate>20210601</creationdate><title>The Science of Guessing in Collision-Optimized Divide-and-Conquer Attacks</title><author>Ou, Changhai ; Lam, Siew-Kei ; Jiang, Guiyuan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-ced212c3325cdd2d11bf48900f31dff9388bccc42ad6fb7cd0bcb97a168630943</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Chains</topic><topic>Collision attack</topic><topic>Collision avoidance</topic><topic>Complexity theory</topic><topic>Computer Science</topic><topic>Computer Science, Hardware & Architecture</topic><topic>Computer Science, Interdisciplinary Applications</topic><topic>Cryptography</topic><topic>divide and conquer</topic><topic>Engineering</topic><topic>Engineering, Electrical & Electronic</topic><topic>Fault tolerance</topic><topic>Fault tolerant systems</topic><topic>FCC</topic><topic>full-collision chain (FCC)</topic><topic>key enumeration</topic><topic>Optimization</topic><topic>Recovery</topic><topic>Registers</topic><topic>Science & Technology</topic><topic>side-channel attack (SCA)</topic><topic>Technology</topic><topic>Thresholds</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ou, Changhai</creatorcontrib><creatorcontrib>Lam, Siew-Kei</creatorcontrib><creatorcontrib>Jiang, Guiyuan</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Web of Science Core Collection</collection><collection>Science Citation Index Expanded</collection><collection>Web of Science - Science Citation Index Expanded - 2021</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on computer-aided design of integrated circuits and systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ou, Changhai</au><au>Lam, Siew-Kei</au><au>Jiang, Guiyuan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>The Science of Guessing in Collision-Optimized Divide-and-Conquer Attacks</atitle><jtitle>IEEE transactions on computer-aided design of integrated circuits and systems</jtitle><stitle>TCAD</stitle><stitle>IEEE T COMPUT AID D</stitle><date>2021-06-01</date><risdate>2021</risdate><volume>40</volume><issue>6</issue><spage>1039</spage><epage>1051</epage><pages>1039-1051</pages><issn>0278-0070</issn><eissn>1937-4151</eissn><coden>ITCSDI</coden><abstract>Recovering keys ranked in very deep candidate space efficiently is a very important but challenging issue in side-channel attacks (SCAs). State-of-the-art collision-optimized divide-and-conquer attacks (CODCAs) extract collision information from a collision attack to optimize the key recovery of a divide-and-conquer attack, and transform the very huge guessing space to a much smaller collision space. However, the inefficient collision detection makes them time consuming. The very limited collisions exploited and large performance difference between the collision attack and the divide-and-conquer attack in CODCAs also prevent their application in much larger spaces. In this article, we propose a Minkowski distance enhanced collision attack (MDCA) with performance closer to template attack (TA) compared to traditional correlation-enhanced collision attack (CECA), thus making the optimization more practical and meaningful. Next, we build a more advanced CODCA named full-collision chain (FCC) from TA and MDCA to exploit all collisions. Moreover, to minimize the thresholds while guaranteeing a high success probability of key recovery, we propose a fault-tolerant scheme to optimize FCC. The full key is divided into several big "blocks," on which a fault-tolerant vector (FTV) is exploited to flexibly adjust its chain space. Finally, guessing theory is exploited to optimize thresholds determination and search order of subkeys. Experimental results show that FCC notably outperforms the existing CODCAs.</abstract><cop>PISCATAWAY</cop><pub>IEEE</pub><doi>10.1109/TCAD.2020.3031243</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0001-9679-6223</orcidid><orcidid>https://orcid.org/0000-0002-1398-821X</orcidid><orcidid>https://orcid.org/0000-0002-8346-2635</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0278-0070 |
ispartof | IEEE transactions on computer-aided design of integrated circuits and systems, 2021-06, Vol.40 (6), p.1039-1051 |
issn | 0278-0070 1937-4151 |
language | eng |
recordid | cdi_proquest_journals_2530113007 |
source | IEEE Electronic Library (IEL) |
subjects | Chains Collision attack Collision avoidance Complexity theory Computer Science Computer Science, Hardware & Architecture Computer Science, Interdisciplinary Applications Cryptography divide and conquer Engineering Engineering, Electrical & Electronic Fault tolerance Fault tolerant systems FCC full-collision chain (FCC) key enumeration Optimization Recovery Registers Science & Technology side-channel attack (SCA) Technology Thresholds |
title | The Science of Guessing in Collision-Optimized Divide-and-Conquer Attacks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-04T16%3A43%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=The%20Science%20of%20Guessing%20in%20Collision-Optimized%20Divide-and-Conquer%20Attacks&rft.jtitle=IEEE%20transactions%20on%20computer-aided%20design%20of%20integrated%20circuits%20and%20systems&rft.au=Ou,%20Changhai&rft.date=2021-06-01&rft.volume=40&rft.issue=6&rft.spage=1039&rft.epage=1051&rft.pages=1039-1051&rft.issn=0278-0070&rft.eissn=1937-4151&rft.coden=ITCSDI&rft_id=info:doi/10.1109/TCAD.2020.3031243&rft_dat=%3Cproquest_RIE%3E2530113007%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2530113007&rft_id=info:pmid/&rft_ieee_id=9225704&rfr_iscdi=true |