作者: Christophe Clavier , Quentin Isorez , Antoine Wurcker
DOI: 10.1007/978-3-319-03515-4_8
关键词:
摘要: Despite Kerckhoffs's principle, proprietary or otherwise secret cryptographic algorithms are still used in real life. For security and efficiency reasons a common design practice simply modifies some parameters of widely well studied encryption standards. In this paper, we investigate the feasibility reverse engineering specifications an AES-like block cipher by SCARE techniques based on collision power analysis. considered observational model, demonstrate that adversary who does not know key can recover full set software implementation even if it is protected first-order Boolean masking shuffling independent operations. We study possible countermeasures recall simple guidelines to mitigate side-channel information with aim thwart our attacks.