does anyone know of an on-line copy of this paper?
- don davis, boston
http://www.ece.wpi.edu/research/crypt/seminar/
A New Class of Side-Channel Attacks on DES,
Prof. Christof Paar, Chair for Communication Security,
Ruhr-University Bochum, Germany
Thursday, August 8, 2002, 1:30 PM, Atwater Kent, WPI, Room 218
[Joint work with Jan Pelzl, Thomas Wollinger and Hans Dobbertin]
Abstract-
About 5 years ago, a new approach for attacking cryptographic hardware was proposed.
This approach is referred to as side-channel attack. It exploits information such as
power consumption, timing behavior, or electro magnetic radiation to extract a secret
key from a piece of cryptographic hardware. These attacks have been proved to be
especially powerfull for reading "hidden" keys from smart cards.
This presentation introduces a new class of side-channel attacks against the popular
block cipher DES. Power analysis is used to detect collisions within the DES algorithm
thus combining a cryptanalytic approach with side channel evaluation. A step-by-step
optimization of the attack is presented in order to increase the probability of a
collision. It is shown that a collision within three adjacent S-boxes of DES can be
found with as few as 135 encryptions (averaged over 10,000 simulated attacks with
random keys) exposing detailed information about 18 key bits.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]