当前位置: X-MOL 学术arXiv.cs.IT › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Recovering AES Keys with a Deep Cold Boot Attack
arXiv - CS - Information Theory Pub Date : 2021-06-09 , DOI: arxiv-2106.04876
Itamar Zimerman, Eliya Nachmani, Lior Wolf

Cold boot attacks inspect the corrupted random access memory soon after the power has been shut down. While most of the bits have been corrupted, many bits, at random locations, have not. Since the keys in many encryption schemes are being expanded in memory into longer keys with fixed redundancies, the keys can often be restored. In this work, we combine a novel cryptographic variant of a deep error correcting code technique with a modified SAT solver scheme to apply the attack on AES keys. Even though AES consists of Rijndael S-box elements, that are specifically designed to be resistant to linear and differential cryptanalysis, our method provides a novel formalization of the AES key scheduling as a computational graph, which is implemented by a neural message passing network. Our results show that our methods outperform the state of the art attack methods by a very large margin.

中文翻译:

使用深度冷启动攻击恢复 AES 密钥

冷启动攻击会在电源关闭后立即检查损坏的随机存取存储器。虽然大多数位已损坏,但随机位置的许多位尚未损坏。由于许多加密方案中的密钥在内存中被扩展为具有固定冗余的更长的密钥,因此通常可以恢复这些密钥。在这项工作中,我们将深度纠错码技术的新型加密变体与修改后的 SAT 求解器方案相结合,以对 AES 密钥进行攻击。尽管 AES 由 Rijndael S-box 元素组成,这些元素专门设计用于抵抗线性和差分密码分析,但我们的方法提供了一种新颖的 AES 密钥调度形式化作为计算图,由神经消息传递网络实现。
更新日期:2021-06-10
down
wechat
bug