@inbook{772f3afc8f944c56ac7f435b8780b485,
title = "A bounded-space near-optimal key enumeration algorithm for multi-subkey side-channel attacks",
abstract = "Enumeration of cryptographic keys in order of likelihood based on side-channel leakages has a significant importance in cryptanalysis. The best optimal-order key enumeration algorithms have a huge space complexity of Ω(nd/2) when there are d subkeys and n candidate values per subkey. In this paper, we present a parallelizable algorithm that enumerates the keys in near-optimal order but enjoys a much better space complexity of O(d2w+dn) for a design parameter w which can be tuned to available RAM. Before presenting our algorithm, we provide lower and upper bounds on the guessing entropy of the full key in terms of the easy-to-compute guessing entropies of the individual subkeys. We use these results to quantify the near-optimality of our algorithm{\textquoteright}s ranking, and to bound its guessing entropy. Finally, we evaluate our algorithm through extensive simulations, to show the advantages of our new algorithm in practice, on realistic SCA scenarios. We show that our algorithm continues its nearoptimal- order enumeration far beyond the rank at which the optimal algorithm fails due to insufficient memory.",
author = "Liron David and Avishai Wool",
note = "Publisher Copyright: {\textcopyright} Springer International Publishing AG 2017.",
year = "2017",
month = jan,
day = "1",
doi = "https://doi.org/10.1007/978-3-319-52153-4_18",
language = "الإنجليزيّة",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "311--327",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
}