Univariate side channel attacks and leakage modeling

被引:111
|
作者
Doget, Julien [1 ,2 ,3 ]
Prouff, Emmanuel [1 ]
Rivain, Matthieu [4 ]
Standaert, Francois-Xavier [2 ]
机构
[1] Oberthur Technol, 71-73 rue Hautes Petures, F-92726 Nanterre, France
[2] Univ Catholique Louvain Ia Neuve, UCL Crypto Grp, B-1348 Louvain, Belgium
[3] Univ Paris 08, Dept Math, F-93526 St Denis, France
[4] CryptoExperts, F-75002 Paris, France
关键词
Side channel attack; Correlation; Regression; Model;
D O I
10.1007/s13389-011-0010-2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Differential power analysis is a powerful cryptanalytic technique that exploits information leaking from physical implementations of cryptographic algorithms. During the two last decades, numerous variations of the original principle have been published. In particular, the univariate case, where a single instantaneous leakage is exploited, has attracted much research effort. In this paper, we argue that several univariate attacks among the most frequently used by the community are not only asymptotically equivalent, but can also be rewritten one in function of the other, only by changing the leakage model used by the adversary. In particular, we prove that most univariate attacks proposed in the literature can be expressed as correlation power analyses with different leakage models. This result emphasizes the major role plays by the model choice on the attack efficiency. In a second point of this paper, we hence also discuss and evaluate side channel attacks that involve no leakage model but rely on some general assumptions about the leakage. Our experiments show that such attacks, named robust, are a valuable alternative to the univariate differential power analyses. They only loose bit of efficiency in case a perfect model is available to the adversary, and gain a lot in case such information is not available.
引用
收藏
页码:123 / 144
页数:22
相关论文
共 50 条
  • [1] Distance Based Leakage Alignment for Side Channel Attacks
    Yang, Wei
    Cao, Yuchen
    Zhou, Yongbin
    Zhang, Hailong
    Zhang, Qian
    IEEE SIGNAL PROCESSING LETTERS, 2016, 23 (04) : 419 - 423
  • [2] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [3] Side-Channel Attacks With Multi-Thread Mixed Leakage
    Gao, Yiwen
    Zhou, Yongbin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 770 - 785
  • [4] Exploiting the microarchitectural leakage of prefetching activities for side-channel attacks
    Xiao, Chong
    Tang, Ming
    Guilley, Sylvain
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 139
  • [5] Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
    Backes, Michael
    Koepf, Boris
    COMPUTER SECURITY - ESORIC 2008, PROCEEDINGS, 2008, 5283 : 517 - +
  • [6] Adversarial Black-Box Attacks with Timing Side-Channel Leakage
    Nakai, Tsunato
    Suzuki, Daisuke
    Omatsu, Fumio
    Fujino, Takeshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (01) : 143 - 151
  • [7] Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
    Oren, Yossef
    Renauld, Mathieu
    Standaert, Francois-Xavier
    Wool, Avishai
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 : 140 - 154
  • [8] A Hybrid Signcryption Scheme with Leakage-resilience Resistant to Side-channel Attacks
    Tseng, Yuh-Min
    Ho, Ting-Chieh
    Huang, Sen-Shan
    Tsai, Tung-Tso
    2024 8TH INTERNATIONAL CONFERENCE ON IMAGING, SIGNAL PROCESSING AND COMMUNICATIONS, ICISPC 2024, 2024, : 148 - 155
  • [9] Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption
    Unterluggauer, Thomas
    Werner, Mario
    Mangard, Stefan
    PROCEEDINGS OF THE 2017 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2017, : 1318 - 1323
  • [10] Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
    Dodis, Yevgeniy
    Pietrzak, Krzysztof
    ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 21 - +