[Resource Topic] 2021/817: Give Me 5 Minutes: Attacking ASCAD with a Single Side-Channel Trace

Welcome to the resource topic for 2021/817

Title:
Give Me 5 Minutes: Attacking ASCAD with a Single Side-Channel Trace

Authors: Olivier Bronchain, Gaëtan Cassiers, and François-Xavier Standaert

Abstract:

In this note, we describe an attack against the ANSSI Side-Channel Analysis Database (ASCAD), which recovers the full key using the leakage of a single masked block cipher execution. The attack uses a new open-source Side-Channel Analysis Library (SCALib), which allows running the leakage profiling and attacking in less than 5 minutes. It exploits well-known techniques, yet improves significantly over the best known attacks against ASCAD. We conclude by questioning the impact of these experimental findings for side-channel security evaluations.

ePrint: https://eprint.iacr.org/2021/817

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .