On the Implementation Efficiency of Linear Regression-Based Side-Channel Attacks

被引:0
|
作者
Ouladj, Maamar [1 ]
Guilley, Sylvain [2 ,3 ,4 ]
Prouff, Emmanuel [5 ,6 ]
机构
[1] Univ Paris VIII, CNRS, UMR 7539, LAGA, 2 Rue Liberte, F-93200 St Denis, France
[2] TELECOM ParisTech, Crypto Grp, Paris 13, France
[3] Secure IC SAS, Rennes, France
[4] Secure IC SAS, Think Ahead Business Line, Paris, France
[5] UPMC Univ Paris 06, Sorbonne Univ, POLSYS, UMR 7606,LIP6, F-75005 Paris, France
[6] ANSSI, Paris, France
关键词
Side-channel analysis; Linear Regression Analysis; Stochastic model; Modular addition masking; Spectral approach; HIGHER-ORDER MASKING; STOCHASTIC METHODS; LEAKAGE;
D O I
10.1007/978-3-030-68773-1_8
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic protocol implementations in both software and hardware leak sensitive information during their execution. Side-channel attacks (SCA) consist in analyzing this information in order to reveal the secret parameters of the protocols. Among the different SCA introduced in the literature, the Linear Regression Analysis (LRA) has been argued to be particularly interesting when few information is available on the hardware architecture of the device executing the protocol (e.g. if the so called Hamming weight model does not hold). However, the computing complexity of the existing LRA implementation is high, which explains why other techniques like e.g. the Correlation Power Analysis (CPA) is often preferred in practice. This paper aims improving the LRA implementation complexity (in memory space and computation) against both unprotected and protected implementations in uni- and multi-variate contexts. In addition we exhibit the relationship between the LRA and the Numerical Normal Form (NNF), which has been originally introduced in the field of Boolean functions. Thanks to this relationship, we deduce the polynomial degree of the normalized product combination of the arithmetic masking. Our improvements have been assessed using simulated leakage of a running AES.
引用
收藏
页码:147 / 172
页数:26
相关论文
共 50 条
  • [1] Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations Towards Analytical Attacks against 32-bit Implementations
    Cassiers G.
    Devillez H.
    Standaert F.-X.
    Udvarhelyi B.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (03): : 270 - 293
  • [2] Side-Channel Attacks Based on Collaborative Learning
    Liu, Biao
    Ding, Zhao
    Pan, Yang
    Li, Jiali
    Feng, Huamin
    DATA SCIENCE, PT 1, 2017, 727 : 549 - 557
  • [3] A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks
    Abdulgadir, Abubakr
    Mohajerani, Kamyar
    Dang, Viet Ba
    Kaps, Jens-Peter
    Gaj, Kris
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 224 - 245
  • [4] Combined Side-Channel Attacks on a Lightweight Prince Cipher Implementation
    Seckiner, Soner
    Kose, Selcuk
    34TH IEEE INTERNATIONAL SYSTEM ON CHIP CONFERENCE (SOCC), 2021, : 260 - 265
  • [5] Power attacks on a side-channel resistant elliptic curve implementation
    Geiselmann, W
    Steinwandt, R
    INFORMATION PROCESSING LETTERS, 2004, 91 (01) : 29 - 32
  • [6] Single-Trace Side-Channel Attacks on NTRU Implementation
    Rabas T.
    Buček J.
    Lórencz R.
    SN Computer Science, 5 (2)
  • [7] Whitenoise Encryption Implementation with Increased Robustness to Side-Channel Attacks
    Sima, Mihai
    Brisson, Andre
    2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,
  • [8] Thwarting Side-Channel Attacks
    Edwards, Chris
    COMMUNICATIONS OF THE ACM, 2020, 63 (10) : 13 - 14
  • [9] Combined Side-Channel Attacks
    Elaabid, M. Abdelaziz
    Meynard, Olivier
    Guilley, Sylvain
    Danger, Jean-Luc
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 175 - 190
  • [10] Side-channel attacks on smartcards
    NGS Software
    Netw. Secur., 2006, 12 (18-20):