TY - JOUR
T1 - Side-Channel Analysis Against SecOC-Compliant AES-CMAC
AU - Ebina, Katsumi
AU - Ueno, Rei
AU - Homma, Naofumi
N1 - Publisher Copyright:
© 2004-2012 IEEE.
PY - 2023/10/1
Y1 - 2023/10/1
N2 - This brief presents a side-channel analysis (SCA) attack for AES-CMAC, which is used in the controller area network (CAN) protocol for in-vehicle networks. It is difficult to apply conventional SCAs that focus on a single round of Sboxes in the AES-CMAC, as is the case in the AES-CMAC/CTR because the AES input values are unknown to the attacker owing to its structure. The proposed method focuses on the Sboxes of the first three rounds of AES continuously and obtains the secret key by sequentially estimating the intermediate values using a first-order SCA. Our method can be applied to all versions of the Secure Onboard Communication (SecOC) standard for securing CAN protocols. We apply a deep-learning-based SCA to implement the proposed attack, in addition to conventional correlation power analysis. We demonstrate the effectiveness of the attack through an experiment using AES-CMAC software that is implemented on the PASTA automotive security evaluation platform, which is compliant with the SecOC standard that is defined in the AUTomotive Open System ARchitecture. The results show that the proposed attack can successfully reveal the secret key of AES-CMAC with at most 400,000 and 150 measurements using conventional non-profiling SCA and deep-learning-based SCA, respectively.
AB - This brief presents a side-channel analysis (SCA) attack for AES-CMAC, which is used in the controller area network (CAN) protocol for in-vehicle networks. It is difficult to apply conventional SCAs that focus on a single round of Sboxes in the AES-CMAC, as is the case in the AES-CMAC/CTR because the AES input values are unknown to the attacker owing to its structure. The proposed method focuses on the Sboxes of the first three rounds of AES continuously and obtains the secret key by sequentially estimating the intermediate values using a first-order SCA. Our method can be applied to all versions of the Secure Onboard Communication (SecOC) standard for securing CAN protocols. We apply a deep-learning-based SCA to implement the proposed attack, in addition to conventional correlation power analysis. We demonstrate the effectiveness of the attack through an experiment using AES-CMAC software that is implemented on the PASTA automotive security evaluation platform, which is compliant with the SecOC standard that is defined in the AUTomotive Open System ARchitecture. The results show that the proposed attack can successfully reveal the secret key of AES-CMAC with at most 400,000 and 150 measurements using conventional non-profiling SCA and deep-learning-based SCA, respectively.
KW - AES
KW - Controller area network
KW - automotive security
KW - side-channel analysis
UR - http://www.scopus.com/inward/record.url?scp=85163496819&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85163496819&partnerID=8YFLogxK
U2 - 10.1109/TCSII.2023.3288278
DO - 10.1109/TCSII.2023.3288278
M3 - Article
AN - SCOPUS:85163496819
SN - 1549-7747
VL - 70
SP - 3772
EP - 3776
JO - IEEE Transactions on Circuits and Systems II: Express Briefs
JF - IEEE Transactions on Circuits and Systems II: Express Briefs
IS - 10
ER -