Algebraic Side-Channel Analysis in the Presence of Errors

被引:0
|
作者
Oren, Yossef [1 ]
Kirschbaum, Mario [2 ]
Popp, Thomas [2 ]
Wool, Avishai [1 ]
机构
[1] Tel Aviv Univ, Comp & Network Secur Lab, Sch Elect Engn, IL-69978 Ramat Aviv, Israel
[2] Graz Univ Technol, Inst Appl Informat Proc & Commun, A-8010 Graz, Austria
基金
奥地利科学基金会;
关键词
Algebraic attacks; power analysis; side-channel attacks; pseudo-Boolean optimization; POWER-ANALYSIS; ATTACKS; AES;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Measurement errors make power analysis attacks difficult to mount when only a single power trace is available: the statistical methods that make DPA attacks so successful are not applicable since they require many (typically thousands) of traces. Recently it was suggested by [18] to use algebraic methods for the single-trace scenario, converting the key recovery problem into a Boolean satisfiability (SAT) problem, then using a SAT solver. However, this approach is extremely sensitive to noise (allowing an error rate of well under 1% at most), and the question of its practicality remained open. In this work we show how a single-trace side-channel analysis problem can be transformed into a pseudo-Boolean optimization (PBOPT) problem, which takes errors into consideration. The PBOPT instance can then be solved using a suitable optimization problem solver. The PBOPT syntax provides for a more expressive input specification which allows a very natural representation of measurement errors. Most importantly, we show that using our approach we are able to mount successful and efficient single-trace attacks even in the presence of realistic error rates of 10%-20%. We call our new attack methodology Tolerant Algebraic Side-Channel Analysis (TASCA). We show practical attacks on two real ciphers: Keeloq and AES.
引用
收藏
页码:428 / +
页数:3
相关论文
共 50 条
  • [21] Symbolic Side-Channel Analysis for Probabilistic Programs
    Malacaria, Pasquale
    Khouzani, M. H. R.
    Pasareanu, Corina S.
    Quoc-Sang Phan
    Luckow, Kasper
    IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, : 313 - 327
  • [22] KeeLoq and Side-Channel Analysis - Evolution of an Attack
    Paar, Christof
    Eisenbarth, Thomas
    Kasper, Markus
    Kasper, Timo
    Moradi, Amir
    PROCEEDINGS OF THE 2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 65 - 69
  • [23] Delivering side-channel analysis in embedded designs
    Seward, DeWitt C.
    Seward, V.I.
    Elenes, Javier
    New Electronics, 2021, 54 (09): : 18 - 20
  • [24] A Modular and Optimized Toolbox for side-Channel Analysis
    Fuentes Rodriguez, Alberto
    Hernandez Encinas, Luis
    Martin Munoz, Agustin
    Alarcos Alcazar, Bernardo
    IEEE ACCESS, 2019, 7 : 21889 - 21903
  • [25] On Side-Channel Analysis of Memristive Cryptographic Circuits
    Chen, Li-Wei
    Chen, Ziang
    Schindler, Werner
    Zhao, Xianyue
    Schmidt, Heidemarie
    Du, Nan
    Polian, Ilia
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 463 - 476
  • [26] DIFFuzz: Differential Fuzzing for Side-Channel Analysis
    Nilizadeh, Shirin
    Noller, Yannic
    Pasareanu, Corina S.
    2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2019), 2019, : 176 - 187
  • [27] Abacus: A Tool for Precise Side-channel Analysis
    Bao, Qinkun
    Wang, Zihao
    Larus, James R.
    Wu, Dinghao
    2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2021), 2021, : 238 - 239
  • [28] Photonic Side-Channel Analysis of Arbiter PUFs
    Tajik, Shahin
    Nedospasov, Dmitry
    Seifert, Jean-Pierre
    Dietz, Enrico
    Frohmann, Sven
    Dittrich, Helmar
    Huebers, Heinz-Wilhelm
    Helfmeier, Clemens
    Boit, Christian
    JOURNAL OF CRYPTOLOGY, 2017, 30 (02) : 550 - 571
  • [29] Photonic Side-Channel Analysis of Arbiter PUFs
    Shahin Tajik
    Enrico Dietz
    Sven Frohmann
    Helmar Dittrich
    Dmitry Nedospasov
    Clemens Helfmeier
    Jean-Pierre Seifert
    Christian Boit
    Heinz-Wilhelm Hübers
    Journal of Cryptology, 2017, 30 : 550 - 571
  • [30] Side-Channel Analysis of PUFs and Fuzzy Extractors
    Merli, Dominik
    Schuster, Dieter
    Stumpf, Frederic
    Sigl, Georg
    TRUST AND TRUSTWORTHY COMPUTING, TRUST 2011, 2011, 6740 : 33 - 47