This paper introduces a new type of collision attack on first-order masked AES. This attack is a known-plaintext attack, while the existing collision attacks are chosen-plaintext attacks. In addition, our method requires much fewer power measurements than the second-order differential power analyses (SODPAs) as well as the existing collision attacks. Some attack results and statistical analysis support this fact
Keyword
Side channel attack; Power analysis; Collision attack; Masking method; Shuffling method; Second-order differential power analysis; AES