作者: Matthieu Rivain , Thomas Roche
DOI: 10.1007/978-3-642-42033-7_27
关键词:
摘要: Side-Channel Analysis SCA is commonly used to recover secret keys involved in the implementation of publicly known cryptographic algorithms. On other hand, for Reverse Engineering SCARE considers an adversary who aims at recovering design some algorithm from its implementation. Most previously published attacks enable recovery parts a cipher ---e.g. substitution boxes--- assuming that rest known. Moreover, these are often based on idealized leakage assumption where recovers noise-free side-channel information. In this paper, we address limitations and describe generic attack can full any iterated block with common structure. Specifically consider family Substitution-Permutation Networks either classical structure as AES or Feistel Based simple usual show how all such ciphers. We then relax our practical deals noisy leakages.