new attack on des

Don Davis dtd at world.std.com
Wed Sep 4 23:03:02 EDT 2002


does anyone know of an on-line copy of this paper?

				- don davis, boston


http://www.ece.wpi.edu/research/crypt/seminar/ 

A New Class of Side-Channel Attacks on DES,
Prof. Christof Paar, Chair for Communication Security,
Ruhr-University Bochum, Germany
Thursday, August 8, 2002, 1:30 PM, Atwater Kent, WPI, Room 218

[Joint work with Jan Pelzl, Thomas Wollinger and Hans Dobbertin]

Abstract-
About 5 years ago, a new approach for attacking cryptographic hardware was proposed. This approach is referred to as side-channel attack. It exploits information such as power consumption, timing behavior, or electro magnetic radiation to extract a secret key from a piece of cryptographic hardware. These attacks have been proved to be especially powerfull for reading "hidden" keys from smart cards.

This presentation introduces a new class of side-channel attacks against the popular block cipher DES. Power analysis is used to detect collisions within the DES algorithm thus combining a cryptanalytic approach with side channel evaluation. A step-by-step optimization of the attack is presented in order to increase the probability of a collision. It is shown that a collision within three adjacent S-boxes of DES can be found with as few as 135 encryptions (averaged over 10,000 simulated attacks with random keys) exposing detailed information about 18 key bits.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com



More information about the cryptography mailing list