On the Implementation Efficiency of Linear Regression-Based Side-Channel Attacks

被引:0
|
作者
Ouladj, Maamar [1 ]
Guilley, Sylvain [2 ,3 ,4 ]
Prouff, Emmanuel [5 ,6 ]
机构
[1] Univ Paris VIII, CNRS, UMR 7539, LAGA, 2 Rue Liberte, F-93200 St Denis, France
[2] TELECOM ParisTech, Crypto Grp, Paris 13, France
[3] Secure IC SAS, Rennes, France
[4] Secure IC SAS, Think Ahead Business Line, Paris, France
[5] UPMC Univ Paris 06, Sorbonne Univ, POLSYS, UMR 7606,LIP6, F-75005 Paris, France
[6] ANSSI, Paris, France
关键词
Side-channel analysis; Linear Regression Analysis; Stochastic model; Modular addition masking; Spectral approach; HIGHER-ORDER MASKING; STOCHASTIC METHODS; LEAKAGE;
D O I
10.1007/978-3-030-68773-1_8
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic protocol implementations in both software and hardware leak sensitive information during their execution. Side-channel attacks (SCA) consist in analyzing this information in order to reveal the secret parameters of the protocols. Among the different SCA introduced in the literature, the Linear Regression Analysis (LRA) has been argued to be particularly interesting when few information is available on the hardware architecture of the device executing the protocol (e.g. if the so called Hamming weight model does not hold). However, the computing complexity of the existing LRA implementation is high, which explains why other techniques like e.g. the Correlation Power Analysis (CPA) is often preferred in practice. This paper aims improving the LRA implementation complexity (in memory space and computation) against both unprotected and protected implementations in uni- and multi-variate contexts. In addition we exhibit the relationship between the LRA and the Numerical Normal Form (NNF), which has been originally introduced in the field of Boolean functions. Thanks to this relationship, we deduce the polynomial degree of the normalized product combination of the arithmetic masking. Our improvements have been assessed using simulated leakage of a running AES.
引用
收藏
页码:147 / 172
页数:26
相关论文
共 50 条
  • [21] Side-Channel Attacks in a Real Scenario
    Tang, Ming
    Luo, Maixing
    Zhou, Junfeng
    Yang, Zhen
    Guo, Zhipeng
    Yan, Fei
    Liu, Liang
    TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 586 - 598
  • [22] Optimal Collision Side-Channel Attacks
    Glowacz, Cezary
    Grosso, Vincent
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019, 2020, 11833 : 126 - 140
  • [23] Side-Channel Attacks on Cryptographic Software
    Lawson, Nate
    IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68
  • [24] Side-Channel Attacks: A Short Tour
    Piessens, Frank
    van Oorschot, Paul C.
    Piessens, Frank
    van Oorshot, Paul C.
    IEEE SECURITY & PRIVACY, 2024, 22 (02) : 75 - 80
  • [25] Cache Side-Channel Attacks and Defenses
    Zhang W.
    Bai L.
    Ling Y.
    Lan X.
    Jia X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222
  • [26] Soft Analytical Side-Channel Attacks
    Veyrat-Charvillon, Nicolas
    Gerard, Benoit
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 282 - 296
  • [27] Side-channel analysis attacks based on deep learning network
    Yu OU
    Lang LI
    Frontiers of Computer Science, 2022, 16 (02) : 37 - 47
  • [28] Side-channel analysis attacks based on deep learning network
    Yu Ou
    Lang Li
    Frontiers of Computer Science, 2022, 16
  • [29] Profiling side-channel attacks based on CNN model fusion
    Ni, Lei
    Wang, Pengjun
    Zhang, Yuejun
    Zhang, Huihong
    Li, Xiangyu
    Ni, Li
    Lv, Jie
    Zheng, Weifang
    MICROELECTRONICS JOURNAL, 2023, 139
  • [30] Side-channel analysis attacks based on deep learning network
    Ou, Yu
    Li, Lang
    FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (02)