Platform for Experts 
Mobile & Backend Security Testing 
Our Company 
Blog
Contact us
eShard
/
escoaching
/
Second Order Scatter Analysis
Advanced

Second-order scatter analysis

In this module, you will learn the principles of scatter second order side-channel analysis. This technique threatens first order protected implementations including masking, jitter and shuffling combined together. You will be guided to implement steps of the attack on a masked AES implementation. You will practice second-order scatter attacks on different set of traces for different second order attack paths until your recover the keys.

Covered Topics

  • Remember side-channel countermeasures
  • Drawbacks of classical second order attacks
  • 2nd order accumulation, joint distributions and probability density functions
  • Scatter distinguishers

Exercises

  • Compute the accumulators, joint distributions and probability density functions
  • Apply distinguisher and identify the secret
  • Attack first order protected AES implementation traces set from a real use case, given to you
  • Given traces from a secret trace set, with no indication from trainers at a first stage, recover the secret

Requirements

  • Familiar with AES algorithm
  • Basic knowledge in coding (Python)
  • Familiar with side-channel concepts (module SCAE.1)
  • Basic knowledge in Scatter attack (module SCAE.8)
Contact us

Practical informations

Overall duration: 1-day if in-person / flexible duration if online.

Schedule: 9am-1pm - 2pm-6 pm (in-person)

Number of trainees: 1 max.

Our Coaches

Guillaume
Bethouart
CopyRights eShard 2022.
All rights reserved
Privacy policy | Legal Notice
PLATFORM FOR EXPERTS
Side Channel AnalysisLaser & EM Fault InjectionFirmware Security AnalysisSecurity Failure AnalysisVulnerability Research
PROFESSIONAL SERVICES