Univariate side channel attacks and leakage modeling

被引:111
|
作者
Doget, Julien [1 ,2 ,3 ]
Prouff, Emmanuel [1 ]
Rivain, Matthieu [4 ]
Standaert, Francois-Xavier [2 ]
机构
[1] Oberthur Technol, 71-73 rue Hautes Petures, F-92726 Nanterre, France
[2] Univ Catholique Louvain Ia Neuve, UCL Crypto Grp, B-1348 Louvain, Belgium
[3] Univ Paris 08, Dept Math, F-93526 St Denis, France
[4] CryptoExperts, F-75002 Paris, France
关键词
Side channel attack; Correlation; Regression; Model;
D O I
10.1007/s13389-011-0010-2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Differential power analysis is a powerful cryptanalytic technique that exploits information leaking from physical implementations of cryptographic algorithms. During the two last decades, numerous variations of the original principle have been published. In particular, the univariate case, where a single instantaneous leakage is exploited, has attracted much research effort. In this paper, we argue that several univariate attacks among the most frequently used by the community are not only asymptotically equivalent, but can also be rewritten one in function of the other, only by changing the leakage model used by the adversary. In particular, we prove that most univariate attacks proposed in the literature can be expressed as correlation power analyses with different leakage models. This result emphasizes the major role plays by the model choice on the attack efficiency. In a second point of this paper, we hence also discuss and evaluate side channel attacks that involve no leakage model but rely on some general assumptions about the leakage. Our experiments show that such attacks, named robust, are a valuable alternative to the univariate differential power analyses. They only loose bit of efficiency in case a perfect model is available to the adversary, and gain a lot in case such information is not available.
引用
收藏
页码:123 / 144
页数:22
相关论文
共 50 条
  • [21] Introduction to Side-Channel Attacks and Fault Attacks
    Li, Yang
    Chen, Mengting
    Wang, Jian
    2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2016, : 573 - 575
  • [22] Power Current Modeling of Cryptographic VLSI Circuits for Analysis of Side Channel Attacks
    Nagata, Makoto
    Fujimoto, Daisuke
    Tanaka, Daichi
    2013 ASIA-PACIFIC SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2013,
  • [23] Thwarting Side-Channel Attacks
    Edwards, Chris
    COMMUNICATIONS OF THE ACM, 2020, 63 (10) : 13 - 14
  • [24] Optical Side Channel Attacks on Singlechip
    Wang, H. S.
    Ji, D. G.
    Zhang, Y.
    Chen, K. Y.
    Chen, J. G.
    Wang, Y. Z.
    Wu, L. A.
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY AND MANAGEMENT SCIENCE (ITMS 2015), 2015, 34 : 364 - 369
  • [25] Side Channel Attacks and Their Mitigation Techniques
    Khan, Ajoy Kumar
    Mahanta, Hridoy Jyoti
    2014 FIRST INTERNATIONAL CONFERENCE ON AUTOMATION, CONTROL, ENERGY & SYSTEMS (ACES-14), 2014, : 133 - 136
  • [26] Leakage-Resilient Public Key Encryption with Equality Test Resistant to Side-channel Attacks
    Tsai, Tung-tso
    Lin, Han-yu
    Chen, Yu-chi
    Chen, Yuan-chin
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2025, 41 (01) : 155 - 176
  • [27] Special Issue on "Side Channel Attacks"
    Hong, Seokhie
    APPLIED SCIENCES-BASEL, 2019, 9 (09):
  • [28] Combined Side-Channel Attacks
    Elaabid, M. Abdelaziz
    Meynard, Olivier
    Guilley, Sylvain
    Danger, Jean-Luc
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 175 - 190
  • [29] Advances in Side Channel Attacks and Countermeasures
    Wang Y.-J.
    Fan H.-P.
    Dai Z.-Y.
    Yuan Q.-J.
    Wang X.-B.
    Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (01): : 202 - 228
  • [30] Behind the Scene of Side Channel Attacks
    Lomne, Victor
    Prouff, Emmanuel
    Roche, Thomas
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT I, 2013, 8269 : 506 - 525