Univariate side channel attacks and leakage modeling

被引:111
|
作者
Doget, Julien [1 ,2 ,3 ]
Prouff, Emmanuel [1 ]
Rivain, Matthieu [4 ]
Standaert, Francois-Xavier [2 ]
机构
[1] Oberthur Technol, 71-73 rue Hautes Petures, F-92726 Nanterre, France
[2] Univ Catholique Louvain Ia Neuve, UCL Crypto Grp, B-1348 Louvain, Belgium
[3] Univ Paris 08, Dept Math, F-93526 St Denis, France
[4] CryptoExperts, F-75002 Paris, France
关键词
Side channel attack; Correlation; Regression; Model;
D O I
10.1007/s13389-011-0010-2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Differential power analysis is a powerful cryptanalytic technique that exploits information leaking from physical implementations of cryptographic algorithms. During the two last decades, numerous variations of the original principle have been published. In particular, the univariate case, where a single instantaneous leakage is exploited, has attracted much research effort. In this paper, we argue that several univariate attacks among the most frequently used by the community are not only asymptotically equivalent, but can also be rewritten one in function of the other, only by changing the leakage model used by the adversary. In particular, we prove that most univariate attacks proposed in the literature can be expressed as correlation power analyses with different leakage models. This result emphasizes the major role plays by the model choice on the attack efficiency. In a second point of this paper, we hence also discuss and evaluate side channel attacks that involve no leakage model but rely on some general assumptions about the leakage. Our experiments show that such attacks, named robust, are a valuable alternative to the univariate differential power analyses. They only loose bit of efficiency in case a perfect model is available to the adversary, and gain a lot in case such information is not available.
引用
收藏
页码:123 / 144
页数:22
相关论文
共 50 条
  • [41] Towards Generic Power/EM Side-Channel Attacks: Memory Leakage on General-Purpose Computers
    Aknesil, Can
    Dubrova, Elena
    PROCEEDINGS OF THE 2022 IFIP/IEEE 30TH INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2022,
  • [42] Testing Cache Side-channel Leakage
    Basu, Tiyash
    Chattopadhyay, Sudipta
    10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS - ICSTW 2017, 2017, : 51 - 60
  • [43] Side-channel leakage tolerant architectures
    Tiri, Kris
    Schaumont, Patrick
    Verbauwhede, Ingrid
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 204 - +
  • [44] Side-Channel Leakage across Borders
    Schmidt, Joern-Marc
    Plos, Thomas
    Kirschbaum, Mario
    Hutter, Michael
    Medwed, Marcel
    Herbst, Christoph
    SMART CARD RESEARCH AND ADVANCED APPLICATION, PROCEEDINGS, 2010, 6035 : 36 - 48
  • [45] A Survey of Side-Channel Leakage Assessment
    Wang, Yaru
    Tang, Ming
    ELECTRONICS, 2023, 12 (16)
  • [46] Side-Channel Attacks on Cryptographic Software
    Lawson, Nate
    IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68
  • [47] Optimal Collision Side-Channel Attacks
    Glowacz, Cezary
    Grosso, Vincent
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019, 2020, 11833 : 126 - 140
  • [48] DRM to Counter Side-Channel Attacks?
    Benadjila, Ryad
    Billet, Olivier
    Francfort, Stanislas
    DRM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON DIGITAL RIGHTS MANAGEMENT, 2007, : 23 - 32
  • [49] Codes for Side-Channel Attacks and Protections
    Guilley, Sylvain
    Heuser, Annelie
    Rioul, Olivier
    CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 35 - 55
  • [50] Side channel attacks on irregularly decimated generators
    Loe, Chuan-Wen
    Khoo, Khoongming
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 116 - 130