On the Implementation Efficiency of Linear Regression-Based Side-Channel Attacks

被引:0
|
作者
Ouladj, Maamar [1 ]
Guilley, Sylvain [2 ,3 ,4 ]
Prouff, Emmanuel [5 ,6 ]
机构
[1] Univ Paris VIII, CNRS, UMR 7539, LAGA, 2 Rue Liberte, F-93200 St Denis, France
[2] TELECOM ParisTech, Crypto Grp, Paris 13, France
[3] Secure IC SAS, Rennes, France
[4] Secure IC SAS, Think Ahead Business Line, Paris, France
[5] UPMC Univ Paris 06, Sorbonne Univ, POLSYS, UMR 7606,LIP6, F-75005 Paris, France
[6] ANSSI, Paris, France
关键词
Side-channel analysis; Linear Regression Analysis; Stochastic model; Modular addition masking; Spectral approach; HIGHER-ORDER MASKING; STOCHASTIC METHODS; LEAKAGE;
D O I
10.1007/978-3-030-68773-1_8
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic protocol implementations in both software and hardware leak sensitive information during their execution. Side-channel attacks (SCA) consist in analyzing this information in order to reveal the secret parameters of the protocols. Among the different SCA introduced in the literature, the Linear Regression Analysis (LRA) has been argued to be particularly interesting when few information is available on the hardware architecture of the device executing the protocol (e.g. if the so called Hamming weight model does not hold). However, the computing complexity of the existing LRA implementation is high, which explains why other techniques like e.g. the Correlation Power Analysis (CPA) is often preferred in practice. This paper aims improving the LRA implementation complexity (in memory space and computation) against both unprotected and protected implementations in uni- and multi-variate contexts. In addition we exhibit the relationship between the LRA and the Numerical Normal Form (NNF), which has been originally introduced in the field of Boolean functions. Thanks to this relationship, we deduce the polynomial degree of the normalized product combination of the arithmetic masking. Our improvements have been assessed using simulated leakage of a running AES.
引用
收藏
页码:147 / 172
页数:26
相关论文
共 50 条
  • [31] Side-Channel Attacks on Query-Based Data Anonymization
    Boenisch, Franziska
    Munz, Reinhard
    Tiepelt, Marcel
    Hanisch, Simon
    Kuhn, Christiane
    Francis, Paul
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 1254 - 1265
  • [32] A Study on Information Security Attack based Side-Channel Attacks
    Kang, Young-Jin
    Bruce, Ndibanje
    Park, SuHyun
    Lee, HoonJae
    2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 61 - 65
  • [33] Cache side-channel attacks detection based on machine learning
    Tong, Zhongkai
    Zhu, Ziyuan
    Wang, Zhanpeng
    Wang, Limin
    Zhang, Yusha
    Liu, Yuxin
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 920 - 927
  • [34] FPGA-Based Remote Power Side-Channel Attacks
    Zhao, Mark
    Suh, G. Edward
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 229 - 244
  • [35] Design and Implementation of a Reconfigurable Cryptographic Coprocessor with Multiple Side-Channel Attacks Countermeasures
    Shang, Xinchao
    Shan, Weiwei
    Liu, Xinning
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2018, 27 (11)
  • [36] Retrieving Lost Efficiency of Scalar Multiplications for Resisting against Side-Channel Attacks
    Wu, Keke
    Li, Huiyun
    Yu, Fengqi
    JOURNAL OF COMPUTERS, 2010, 5 (12) : 1878 - 1884
  • [37] A gradient deconvolutional network for side-channel attacks
    Li, Yanbin
    Huang, Yuxin
    Jia, Fuwei
    Zhao, Qingsong
    Tang, Ming
    Ren, Shougang
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 98
  • [38] Remote Side-Channel Attacks on Anonymous Transactions
    Tramer, Florian
    Boneh, Dan
    Paterson, Kenneth G.
    PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 2739 - 2756
  • [39] Side-Channel Attacks on Mobile and Wearable Systems
    Nahapetian, Ani
    2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2016,
  • [40] A Survey of Side-Channel Attacks on Caches and Countermeasures
    Yangdi Lyu
    Prabhat Mishra
    Journal of Hardware and Systems Security, 2018, 2 (1) : 33 - 50