First Principal Components Analysis: A New Side Channel Distinguisher

被引:0
|
作者
Souissi, Youssef [1 ]
Nassar, Maxime [1 ]
Guilley, Sylvain [1 ]
Danger, Jean-Luc [1 ]
Flament, Florent [1 ]
机构
[1] TELECOM ParisTech, CNRS LTCI UMR 5141, F-75634 Paris, France
关键词
Principal Component Analysis (PCA); Data Encryption Standard (DES); Side Channel Attacks (DoM; DPA; CPA; VPA); Masking countermeasures; TEMPLATE ATTACKS; POWER; LEAKAGE; DPA;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Side Channel Analysis (SCA) are of great concern since they have shown their efficiency in retrieving sensitive information from secure devices. In this paper we introduce First Principal Components Analysis (FPCA.) which consists in evaluating the relevance of a partitioning using the projection on the first principal directions as a distinguisher. Indeed, FPCA is a novel application of the Principal Component Analysis (PCA). In SCA like Template attacks, PCA has been previously used as a pre-processing tool. The originality of FPCA is to use PCA no more as a preprocessing tool but as a distinguisher. We conducted all our experiments in real life context, using a recently introduced practice-oriented SCA evaluation framework. We show that FPCA is more performant than first-order SCA (DoM, DPA, CPA) when performed on unprotected DES architecture. Moreover, we outline that FPCA is still efficient on masked DES implementation, and show how it outperforms Variance Power Analysis (VPA) which is a known successful attack on such countermeasures.
引用
收藏
页码:407 / 419
页数:13
相关论文
共 50 条