Title :
One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores
Author :
Moradi, Amir ; Mischke, Oliver ; Paar, Christof
Author_Institution :
Horst Gortz Institutefor IT-Security, Ruhr Univ. Bochum, Bochum, Germany
Abstract :
When complex functions, for example, substitution boxes of block ciphers, are realized in hardware, timing attributes of the underlying combinational circuit depend on the input/output changes of the function. These characteristics can be exploited by the help of a relatively new scheme called fault sensitivity analysis. A collision timing attack which exploits the data-dependent timing characteristics of combinational circuits is demonstrated in this paper. The attack is based on an also recently published correlation collision attack, which avoids the need for a hypothetical timing model for the underlying combinational circuit to recover the secret materials. The target platforms of our proposed attack are 14 AES ASIC cores of the SASEBO LSI chips in three different process technologies, 13 nm, 90 nm, and 65 nm. Successfully breaking all cores including the DPA-protected and fault attack protected cores indicates the strength of the attack.
Keywords :
application specific integrated circuits; cryptography; microprocessor chips; AES ASIC core; SASEBO LSI chip; advanced encryption standard; application-specific integrated circuits; block cipher; collision timing attack; combinational circuit; correlation collision attack; data-dependent timing characteristic; fault sensitivity analysis; input-output function change; size 13 nm; size 65 nm; size 90 nm; Application specific integrated circuits; Circuit faults; Clocks; Combinational circuits; Correlation; Encryption; Timing; AES; ASIC; Index Terms â Side-channel attack; collision attack; fault attack; fault sensitivity attack; timing attack;
Journal_Title :
Computers, IEEE Transactions on
DOI :
10.1109/TC.2012.154