Skip to main content
Top

2019 | OriginalPaper | Chapter

Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock

Authors : Dor Fledel, Avishai Wool

Published in: Selected Areas in Cryptography – SAC 2018

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Power analysis side channel attacks rely on aligned traces. As a counter-measure, devices can use a jittered clock to misalign the power traces. In this paper we suggest a way to overcome this counter-measure, using an old method of integrating samples over time followed by a correlation attack (Sliding Window CPA). We theoretically re-analyze this general method with characteristics of jittered clocks and show that it is stronger than previously believed. We show that integration of samples over a suitably chosen window size actually amplifies the correlation both with and without jitter—as long as multiple leakage points are present within the window. We then validate our analysis on a new data-set of traces measured on a board implementing a jittered clock. The data-set we collected is public and accessible online. Our experiments show that the SW-CPA attack with a well-chosen window size is very successful against a jittered clock counter-measure and significantly outperforms previous suggestions, requiring a much smaller set of traces to correctly identify the correct key.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
[FH08]
go back to reference Ferrigno, J., Hlaváč, M.: When AES blinks: introducing optical side channel. IET Inf. Secur. 2(3), 94–98 (2008)CrossRef Ferrigno, J., Hlaváč, M.: When AES blinks: introducing optical side channel. IET Inf. Secur. 2(3), 94–98 (2008)CrossRef
[HHO15]
go back to reference Hodgers, P., Hanley, N., O’Neill, M.: Pre-processing power traces to defeat random clocking countermeasures. In: International Symposium on Circuits and Systems (ISCAS), pp. 85–88. IEEE (2015) Hodgers, P., Hanley, N., O’Neill, M.: Pre-processing power traces to defeat random clocking countermeasures. In: International Symposium on Circuits and Systems (ISCAS), pp. 85–88. IEEE (2015)
[HNI+06]
[OC15]
go back to reference O’Flynn, C., Chen, Z.: Synchronous sampling and clock recovery of internal oscillators for side channel analysis and fault injection. J. Crypt. Eng. 5(1), 53–69 (2015)CrossRef O’Flynn, C., Chen, Z.: Synchronous sampling and clock recovery of internal oscillators for side channel analysis and fault injection. J. Crypt. Eng. 5(1), 53–69 (2015)CrossRef
[PV17]
go back to reference Papagiannopoulos, K., Veshchikov, N.: Mind the gap: towards secure 1st-order masking in software. IACR Cryptology ePrint Archive, p. 345 (2017) Papagiannopoulos, K., Veshchikov, N.: Mind the gap: towards secure 1st-order masking in software. IACR Cryptology ePrint Archive, p. 345 (2017)
[SDB+10]
go back to reference Schimmel, O., Duplys, P., Boehl, E., Hayek, J., Bosch, R., Rosenstiel, W.: Correlation power analysis in frequency domain. In: COSADE First International Workshop on Constructive Side Channel Analysis and Secure Design (2010) Schimmel, O., Duplys, P., Boehl, E., Hayek, J., Bosch, R., Rosenstiel, W.: Correlation power analysis in frequency domain. In: COSADE First International Workshop on Constructive Side Channel Analysis and Secure Design (2010)
[TH12]
go back to reference Tian, Q., Huss, S.A.: On the attack of misaligned traces by power analysis methods. In: 2012 Seventh International Conference on Computer Engineering and Systems (ICCES), pp. 28–34. IEEE (2012) Tian, Q., Huss, S.A.: On the attack of misaligned traces by power analysis methods. In: 2012 Seventh International Conference on Computer Engineering and Systems (ICCES), pp. 28–34. IEEE (2012)
Metadata
Title
Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock
Authors
Dor Fledel
Avishai Wool
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-10970-7_9

Premium Partner