Recovering AES Keys with a Deep Cold Boot Attack

06/09/2021
by   Itamar Zimerman, et al.
0

Cold boot attacks inspect the corrupted random access memory soon after the power has been shut down. While most of the bits have been corrupted, many bits, at random locations, have not. Since the keys in many encryption schemes are being expanded in memory into longer keys with fixed redundancies, the keys can often be restored. In this work, we combine a novel cryptographic variant of a deep error correcting code technique with a modified SAT solver scheme to apply the attack on AES keys. Even though AES consists of Rijndael S-box elements, that are specifically designed to be resistant to linear and differential cryptanalysis, our method provides a novel formalization of the AES key scheduling as a computational graph, which is implemented by a neural message passing network. Our results show that our methods outperform the state of the art attack methods by a very large margin.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/29/2018

Recovering short secret keys of RLCE in polynomial time

We present a key recovery attack against Y. Wang's Random Linear Code En...
research
12/06/2017

Cryptanalysis of a public key encryption scheme based on QC-LDPC and QC-MDPC codes

This letter presents a cryptanalysis of the modified McEliece cryptosyst...
research
12/21/2021

CryptoMiniSat Switches-Optimization for Solving Cryptographic Instances

Performing hundreds of test runs and a source-code analysis, we empirica...
research
07/08/2023

Attacking (EC)DSA scheme with ephemeral keys sharing specific bits

In this paper, we present a deterministic attack on (EC)DSA signature sc...
research
08/11/2023

Security of XCB and HCTR

Tweakable Enciphering Scheme (TES) is a length preserving scheme which p...
research
09/12/2022

SmartKex: Machine Learning Assisted SSH Keys Extraction From The Heap Dump

Digital forensics is the process of extracting, preserving, and document...
research
01/04/2022

An algebraic attack to the Bluetooth stream cipher E0

In this paper we study the security of the Bluetooth stream cipher E0 fr...

Please sign up or login with your details

Forgot password? Click here to reset