[Resource Topic] 2018/291: Simulations of Optical Emissions for Attacking AES and Masked AES

Welcome to the resource topic for 2018/291

Title:
Simulations of Optical Emissions for Attacking AES and Masked AES

Authors: Guido Marco Bertoni, Lorenzo Grassi, Filippo Melzani

Abstract:

In this paper we present a novel attack based on photonic emission analysis targeting software implementations of AES. We focus on the particular case in which the attacker can collect the photonic emission of a limited number of sense amplifiers (e.g. only one) of the SRAM storing the S-Box. The attack consists in doing hypothesis on the secret key based on the knowledge of the partial output of the SubBytes operation. We also consider the possibility to attack a masked implementation of AES using the photonic emission analysis. In the case of masking, the attacker needs 2 leakages of the same encryption to overcome the randomization of the masks. For our analysis, we assume the same physical setup described in other previous works. Reported results are based on simulations with some hypothesis on the probability of photonic emission of a single transistor.

ePrint: https://eprint.iacr.org/2018/291

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .