Universite Bordeaux 1
Algebraic side-channel attacks have been recently introduced as a powerful cryptanalysis technique against block ciphers. These attacks represent both a target algorithm and its physical information leakages as an over-defined system of equations that the adversary tries to solve. They were first applied to PRESENT because of its simple algebraic structure. In this paper, the authors investigate the extent to which they can be exploited against the AES rijndael and discuss their practical specificities. They show experimentally that most of the intuitions that hold for PRESENT can also be observed for an unprotected implementation of rijndael in an 8-bit controller.