Univariate side channel attacks and leakage modeling

被引:111
|
作者
Doget, Julien [1 ,2 ,3 ]
Prouff, Emmanuel [1 ]
Rivain, Matthieu [4 ]
Standaert, Francois-Xavier [2 ]
机构
[1] Oberthur Technol, 71-73 rue Hautes Petures, F-92726 Nanterre, France
[2] Univ Catholique Louvain Ia Neuve, UCL Crypto Grp, B-1348 Louvain, Belgium
[3] Univ Paris 08, Dept Math, F-93526 St Denis, France
[4] CryptoExperts, F-75002 Paris, France
关键词
Side channel attack; Correlation; Regression; Model;
D O I
10.1007/s13389-011-0010-2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Differential power analysis is a powerful cryptanalytic technique that exploits information leaking from physical implementations of cryptographic algorithms. During the two last decades, numerous variations of the original principle have been published. In particular, the univariate case, where a single instantaneous leakage is exploited, has attracted much research effort. In this paper, we argue that several univariate attacks among the most frequently used by the community are not only asymptotically equivalent, but can also be rewritten one in function of the other, only by changing the leakage model used by the adversary. In particular, we prove that most univariate attacks proposed in the literature can be expressed as correlation power analyses with different leakage models. This result emphasizes the major role plays by the model choice on the attack efficiency. In a second point of this paper, we hence also discuss and evaluate side channel attacks that involve no leakage model but rely on some general assumptions about the leakage. Our experiments show that such attacks, named robust, are a valuable alternative to the univariate differential power analyses. They only loose bit of efficiency in case a perfect model is available to the adversary, and gain a lot in case such information is not available.
引用
收藏
页码:123 / 144
页数:22
相关论文
共 50 条
  • [31] Side-channel attacks on smartcards
    NGS Software
    Netw. Secur., 2006, 12 (18-20):
  • [32] Algebraic Side-Channel Attacks
    Renauld, Mathieu
    Standaert, Francois-Xavier
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 393 - 410
  • [33] On the Detection of Side-Channel Attacks
    Vateva-Gurova, Tsvetoslava
    Suri, Neeraj
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 185 - 186
  • [34] An Approach for Isolating the Sources of Information Leakage Exploited in Cache-Based Side-Channel Attacks
    Atici, Ali Can
    Yilmaz, Cemal
    Savas, Erkay
    2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C), 2013, : 75 - 84
  • [35] A Leakage-Resilient Certificateless Authenticated Key Exchange Protocol Withstanding Side-Channel Attacks
    Hsieh, Tsung-Che
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE ACCESS, 2020, 8 (08): : 121795 - 121810
  • [36] A Novel Completeness Test for Leakage Models and Its Application to Side Channel Attacks and Responsibly Engineered Simulators
    Gao, Si
    Oswald, Elisabeth
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT III, 2022, 13277 : 254 - 283
  • [37] Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices
    Standaert, Francois-Xavier
    Gierlichs, Benedikt
    Verbauwhede, Ingrid
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 253 - +
  • [38] Effect of Aging on PUF Modeling Attacks based on Power Side-Channel Observations
    Kroeger, Trevor
    Cheng, Wei
    Guilley, Sylvain
    Danger, Jean-Luc
    Karimi, Naghmeh
    PROCEEDINGS OF THE 2020 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2020), 2020, : 454 - 459
  • [39] Modeling soft analytical side-channel attacks from a coding theory viewpoint
    Guo Q.
    Grosso V.
    Standaert F.-X.
    Bronchain O.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (04): : 209 - 238
  • [40] What Is Now Possible? Security Evaluation on Univariate DPA Attacks With Inaccurate Leakage Models
    Long, Jiangshan
    Ou, Changhai
    Wang, Chenxu
    Wang, Zhu
    Zhou, Yongbin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8441 - 8456