Probing attack of share-serial threshold implementation of advanced encryption standard

The authors present the first security evaluation of the side-channel attack countermeasure called the share-serial threshold implementation proposed by Wegener and Moradi. In the share-serial threshold implementation, all the component functions are processed using a unified circuit thereby reducin...

Full description

Saved in:
Bibliographic Details
Published inElectronics letters Vol. 55; no. 9; pp. 517 - 519
Main Authors Sugawara, T, Li, Y, Sakiyama, K
Format Journal Article
LanguageEnglish
Published The Institution of Engineering and Technology 01.05.2019
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The authors present the first security evaluation of the side-channel attack countermeasure called the share-serial threshold implementation proposed by Wegener and Moradi. In the share-serial threshold implementation, all the component functions are processed using a unified circuit thereby reducing total circuit area. They show that the share-serial threshold implementation is vulnerable to probing attack using a single probe. In the proposed attack, an attacker places a single probe on a wire in the unified circuit and read the target wire over multiple cycles. The attacker can recover unshared 1-bit intermediate value by combining the measured data. The attack highlights an interesting difference between side-channel analysis and probing attack. The authors also evaluate the number of cipher calls to attack the block cipher advanced encryption standard (AES).
ISSN:0013-5194
1350-911X
1350-911X
DOI:10.1049/el.2018.7518