ASCAD icon indicating copy to clipboard operation
ASCAD copied to clipboard

The index of attack traces in v2 trace set

Open keykeykeykeyk opened this issue 4 years ago • 2 comments

In v2 trace set, do you use the fixed key after index 500,000? Thank you

keykeykeykeyk avatar Jun 04 '21 09:06 keykeykeykeyk

Hi,

Actually the key is random for all the index of the v2 dataset. During the attack step, a fixed key is simulated by modifying the input plaintext that is used to compute the rank function. Details about such simulation can be found in the article: https://eprint.iacr.org/2021/592.pdf (Section 4, equation (7)).

Regards, ASCAD Team

rstrullu avatar Jun 17 '21 08:06 rstrullu

Hi,

Actually the key is random for all the index of the v2 dataset. During the attack step, a fixed key is simulated by modifying the input plaintext that is used to compute the rank function. Details about such simulation can be found in the article: https://eprint.iacr.org/2021/592.pdf (Section 4, equation (7)).

Regards, ASCAD Team

Oh, it's my bad not noticing you also released a new paper. Thanks for your reply anyway.

keykeykeykeyk avatar Jun 18 '21 06:06 keykeykeykeyk

Regarding this I came across some doubts that

  1. In v2 dataset we have different random keys for each pair of plain text , masks and trace so Please clear us that is there any way that all the different keys which have been given produces us the same master key through masking of given different key bytes in Metadata or it's vice versa that given key has been already masked and provided to us in the dataset then how we can derive a common key through them

I have trying to understand that how during the attack step we will be recovering the key bytes as we have different key for each different trace , Thanking you. @rstrullu @keykeykeykeyk

Vaibhav-Sharma010204 avatar May 13 '24 08:05 Vaibhav-Sharma010204