Skip to main content
Erschienen in: Journal of Cryptographic Engineering 4/2020

30.08.2020 | Regular Paper

On the power of template attacks in highly multivariate context

verfasst von: Maamar Ouladj, Nadia El Mrabet, Sylvain Guilley, Philippe Guillot, Gilles Millérioux

Erschienen in: Journal of Cryptographic Engineering | Ausgabe 4/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

When implemented in software (or hardware), a cryptographic protocol can leak sensitive information during its execution. Side-channel attacks can use those leakages in order to reveal some information about the secret used by the algorithm. The leaking side-channel information can take place in many time samples. Measurement appliances can cope with the acquisition of multiple samples. From an adversarial point of view, it is therefore beneficial to attempt to make the most of highly multivariate traces. On the one hand, template attacks have been introduced to deal with multivariate leakages, with as few assumptions as possible on the leakage model. On the other hand, many works have underlined the need for dimensionality reduction. In this paper, we clarify the relationship between template attacks in full space and in linear subspaces, in terms of success rate. In particular, we exhibit a clear mathematical expression for template attacks, which enables an efficient computation even on large dimensions such as several hundred of samples. It is noteworthy that both of PoI-based and PCA-based template attacks can straightforwardly benefit from our approach. Furthermore, we extend the approach to the masking-based protected implementations. Our approach is validated both by simulated and real-world traces.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Recall that \(\varSigma \) is a symmetric matrix. Therefore, there exists one invertible matrix P such that \(\varSigma = P D P^{-1}\), where D is a diagonal matrix whose diagonal coefficients are all positive. It is customary to call the diagonal coefficients of D the eigenvalues of \(\varSigma \) and P the matrix of eigen-vectors of \(\varSigma \). Let us denote \(D^{1/2}\) the diagonal matrix where diagonal coefficients are the square root of those of D. Then, \(\varSigma ^{1/2} := P D^{1/2} P^{-1}\) matches the definition, since \(\varSigma ^{1/2} \varSigma ^{1/2} = P D^{1/2} P^{-1} P D^{1/2} P^{-1} = P D^{1/2} D^{1/2} P^{-1} = P D P^{-1} = \varSigma \).
 
Literatur
1.
Zurück zum Zitat Archambeau, C., Peeters, É., Standaert, F.-X., Quisquater, J.-J.: Template Attacks in Principal Subspaces. In: CHES, Vol. 4249 of LNCS, pp. 1–14. Springer, Yokohama, Japan, October 10-13 (2006) Archambeau, C., Peeters, É., Standaert, F.-X., Quisquater, J.-J.: Template Attacks in Principal Subspaces. In: CHES, Vol. 4249 of LNCS, pp. 1–14. Springer, Yokohama, Japan, October 10-13 (2006)
3.
Zurück zum Zitat Bhasin, S., Danger, J.-L., Guilley, S., Najm, Z.: NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage. In: International Symposium on Electromagnetic Compatibility (EMC ’14 / Tokyo). IEEE, Session OS09: EM Information Leakage. Hitotsubashi Hall (National Center of Sciences), Chiyoda, Tokyo, Japan, May 12-16 (2014) Bhasin, S., Danger, J.-L., Guilley, S., Najm, Z.: NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage. In: International Symposium on Electromagnetic Compatibility (EMC ’14 / Tokyo). IEEE, Session OS09: EM Information Leakage. Hitotsubashi Hall (National Center of Sciences), Chiyoda, Tokyo, Japan, May 12-16 (2014)
4.
Zurück zum Zitat Bhasin, S., Danger, J.-L., Guilley, S., Najm, Z.: Side-channel Leakage and Trace Compression Using Normalized Inter-class Variance. In: Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy, HASP ’14, pp. 7:1–7:9. New York, NY, USA, ACM (2014) Bhasin, S., Danger, J.-L., Guilley, S., Najm, Z.: Side-channel Leakage and Trace Compression Using Normalized Inter-class Variance. In: Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy, HASP ’14, pp. 7:1–7:9. New York, NY, USA, ACM (2014)
5.
Zurück zum Zitat Brier, É., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds), Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, vol. 3156 of Lecture Notes in Computer Science, pp. 16–29. Springer (2004) Brier, É., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds), Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, vol. 3156 of Lecture Notes in Computer Science, pp. 16–29. Springer (2004)
6.
Zurück zum Zitat Bruneau, N., Guilley, S., Heuser, A., Marion, D., Rioul, O.: Less is More - Dimensionality Reduction from a Theoretical Perspective. In: Güneysu, T., Handschuh, H. (eds), Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings, vol. 9293 of Lecture Notes in Computer Science, pp. 22–41. Springer (2015) Bruneau, N., Guilley, S., Heuser, A., Marion, D., Rioul, O.: Less is More - Dimensionality Reduction from a Theoretical Perspective. In: Güneysu, T., Handschuh, H. (eds), Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings, vol. 9293 of Lecture Notes in Computer Science, pp. 22–41. Springer (2015)
7.
Zurück zum Zitat Bruneau, N., Guilley, S., Heuser, A., Marion, D., Rioul, O.: Optimal side-channel attacks for multivariate leakages and multiple models. J. Cryptogr. Eng. 7(4), 331–341 (2017)CrossRef Bruneau, N., Guilley, S., Heuser, A., Marion, D., Rioul, O.: Optimal side-channel attacks for multivariate leakages and multiple models. J. Cryptogr. Eng. 7(4), 331–341 (2017)CrossRef
8.
Zurück zum Zitat Bruneau, N., Guilley, S., Heuser, A., Rioul, O.: Masks Will Fall Off – Higher-Order Optimal Distinguishers. In: Sarkar, P., Iwata, T. (eds), Advances in Cryptology – ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II, vol. 8874 of Lecture Notes in Computer Science, pp. 344–365. Springer (2014) Bruneau, N., Guilley, S., Heuser, A., Rioul, O.: Masks Will Fall Off – Higher-Order Optimal Distinguishers. In: Sarkar, P., Iwata, T. (eds), Advances in Cryptology – ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II, vol. 8874 of Lecture Notes in Computer Science, pp. 344–365. Springer (2014)
9.
Zurück zum Zitat Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Burton, S., Kaliski, Jr., Koç, Ç.K., Paar, C. (eds), Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, vol. 2523 of Lecture Notes in Computer Science, pp. 13–28. Springer (2002) Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Burton, S., Kaliski, Jr., Koç, Ç.K., Paar, C. (eds), Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, vol. 2523 of Lecture Notes in Computer Science, pp. 13–28. Springer (2002)
10.
Zurück zum Zitat Choudary, O., Kuhn, M.G.: Efficient template attacks. In: Francillon, A., Rohatgi, P. (eds), Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers, vol. 8419 of LNCS, pp. 253–270. Springer (2013) Choudary, O., Kuhn, M.G.: Efficient template attacks. In: Francillon, A., Rohatgi, P. (eds), Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers, vol. 8419 of LNCS, pp. 253–270. Springer (2013)
11.
Zurück zum Zitat Clavier, C., Coron, J.-S., Dabbous, N.: Differential Power Analysis in the Presence of Hardware Countermeasures. In: Koç, Ç.K., Paar, C. (eds), CHES, vol. 1965 of Lecture Notes in Computer Science, pp. 252–263. Springer (2000) Clavier, C., Coron, J.-S., Dabbous, N.: Differential Power Analysis in the Presence of Hardware Countermeasures. In: Koç, Ç.K., Paar, C. (eds), CHES, vol. 1965 of Lecture Notes in Computer Science, pp. 252–263. Springer (2000)
12.
Zurück zum Zitat Coron, J.-S., Goubin, L.: On Boolean and Arithmetic Masking against Differential Power Analysis. In: CHES, vol. 1965 of Lecture Notes in Computer Science, pp. 231–237. Springer, Worcester, MA, USA, August 17-18 (2000) Coron, J.-S., Goubin, L.: On Boolean and Arithmetic Masking against Differential Power Analysis. In: CHES, vol. 1965 of Lecture Notes in Computer Science, pp. 231–237. Springer, Worcester, MA, USA, August 17-18 (2000)
13.
Zurück zum Zitat Coron, J.-S., Kizhvatov, I.: An efficient method for random delay generation in embedded software. In: Clavier, C., Gaj, K. (eds), Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings, vol. 5747 of Lecture Notes in Computer Science, pp. 156–170. Springer (2009) Coron, J.-S., Kizhvatov, I.: An efficient method for random delay generation in embedded software. In: Clavier, C., Gaj, K. (eds), Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings, vol. 5747 of Lecture Notes in Computer Science, pp. 156–170. Springer (2009)
14.
Zurück zum Zitat Coron, J.-S., Vadnala, P.K., Giraud, C., Prouff, E., Renner, S., Rivain, M.: Conversion of Security Proofs from One Model to Another: A New Issue. In: COSADE, Lecture Notes in Computer Science. Springer, Darmstaft, Germany, May 3–4 (2012) Coron, J.-S., Vadnala, P.K., Giraud, C., Prouff, E., Renner, S., Rivain, M.: Conversion of Security Proofs from One Model to Another: A New Issue. In: COSADE, Lecture Notes in Computer Science. Springer, Darmstaft, Germany, May 3–4 (2012)
16.
Zurück zum Zitat Debande, N., Souissi, Y., Abdelaziz Elaabid, M., Guilley, S., Danger, J.-L.: Wavelet transform based pre-processing for side channel analysis. In: 45th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 2012, Workshops Proceedings, Vancouver, BC, Canada, December 1-5, 2012, pp. 32–38. IEEE Computer Society (2012) Debande, N., Souissi, Y., Abdelaziz Elaabid, M., Guilley, S., Danger, J.-L.: Wavelet transform based pre-processing for side channel analysis. In: 45th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 2012, Workshops Proceedings, Vancouver, BC, Canada, December 1-5, 2012, pp. 32–38. IEEE Computer Society (2012)
17.
Zurück zum Zitat Durvaux, F., Renauld, M., Standaert, F.-X., van Oldeneel tot Oldenzeel, L., Veyrat-Charvillon, N.: Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models. In: Mangard, S. (ed) CARDIS, vol. 7771 of Lecture Notes in Computer Science, pp. 123–140. Springer (2012) Durvaux, F., Renauld, M., Standaert, F.-X., van Oldeneel tot Oldenzeel, L., Veyrat-Charvillon, N.: Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models. In: Mangard, S. (ed) CARDIS, vol. 7771 of Lecture Notes in Computer Science, pp. 123–140. Springer (2012)
18.
Zurück zum Zitat Abdelaziz Elaabid, M., Guilley, S.: Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator. In: Bernstein, D.J., Lange, T. (eds), Progress in Cryptology - AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings, vol. 6055 of Lecture Notes in Computer Science, pp. 243–260. Springer (2010) Abdelaziz Elaabid, M., Guilley, S.: Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator. In: Bernstein, D.J., Lange, T. (eds), Progress in Cryptology - AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings, vol. 6055 of Lecture Notes in Computer Science, pp. 243–260. Springer (2010)
19.
Zurück zum Zitat Facon, A., Guilley, S., Lec’Hvien, M., Marion, D., Perianin, T.: Binary Data Analysis for Source Code Leakage Assessment, In: 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papers, pp. 391–409. 01 (2019) Facon, A., Guilley, S., Lec’Hvien, M., Marion, D., Perianin, T.: Binary Data Analysis for Source Code Leakage Assessment, In: 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papers, pp. 391–409. 01 (2019)
20.
Zurück zum Zitat Fan, G., Zhou, Y., Zhang, H., Feng, D.: How to Choose Interesting Points for Template Attacks More Effectively? In: Yung, M., Zhu, L., Yang, Y. (eds), Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, vol. 9473 of Lecture Notes in Computer Science, pp. 168–183. Springer (2014) Fan, G., Zhou, Y., Zhang, H., Feng, D.: How to Choose Interesting Points for Template Attacks More Effectively? In: Yung, M., Zhu, L., Yang, Y. (eds), Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, vol. 9473 of Lecture Notes in Computer Science, pp. 168–183. Springer (2014)
21.
Zurück zum Zitat Guilley, S., Heuser, A., Tang, M., Rioul, O.: Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition. In: Farshim, P., Simion, E. (eds), Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers, vol. 10543 of Lecture Notes in Computer Science, pp. 12–27. Springer (2017) Guilley, S., Heuser, A., Tang, M., Rioul, O.: Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition. In: Farshim, P., Simion, E. (eds), Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers, vol. 10543 of Lecture Notes in Computer Science, pp. 12–27. Springer (2017)
22.
Zurück zum Zitat Guilley, S., Khalfallah, K., Lomné, V., Danger, J.-L.: Formal Framework for the Evaluation of Waveform Resynchronization Algorithms. In: Ardagna, C.A., Zhou J. (eds), Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings, vol. 6633 of Lecture Notes in Computer Science, pp. 100–115. Springer (2011) Guilley, S., Khalfallah, K., Lomné, V., Danger, J.-L.: Formal Framework for the Evaluation of Waveform Resynchronization Algorithms. In: Ardagna, C.A., Zhou J. (eds), Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings, vol. 6633 of Lecture Notes in Computer Science, pp. 100–115. Springer (2011)
23.
Zurück zum Zitat Guillot, P., Millérioux, G., Dravie, B., El Mrabet, N.: Spectral Approach for Correlation Power Analysis. In: El Hajji, S., Nitaj, A., Souidi, E.M. (eds), Codes, Cryptology and Information Security - Second International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet, vol. 10194 of Lecture Notes in Computer Science, pp. 238–253. Springer (2017) Guillot, P., Millérioux, G., Dravie, B., El Mrabet, N.: Spectral Approach for Correlation Power Analysis. In: El Hajji, S., Nitaj, A., Souidi, E.M. (eds), Codes, Cryptology and Information Security - Second International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet, vol. 10194 of Lecture Notes in Computer Science, pp. 238–253. Springer (2017)
24.
Zurück zum Zitat Hajra, S., Mukhopadhyay, D.: Reaching the limit of nonprofiling DPA. IEEE Trans. CAD Integr. Circuits Syst. 34(6), 915–927 (2015) CrossRef Hajra, S., Mukhopadhyay, D.: Reaching the limit of nonprofiling DPA. IEEE Trans. CAD Integr. Circuits Syst. 34(6), 915–927 (2015) CrossRef
25.
Zurück zum Zitat Jolliffe, I.T.: Principal Component Analysis. Springer Series in Statistics (2002). ISBN: 0387954422 Jolliffe, I.T.: Principal Component Analysis. Springer Series in Statistics (2002). ISBN: 0387954422
26.
Zurück zum Zitat Joye, M., Paillier, P., Schoenmakers, B.: On Second-Order Differential Power Analysis. In: CHES, vol. 3659 of LNCS, pp. 293–308. Springer, Edinburgh, UK, August 29 – September 1st (2005) Joye, M., Paillier, P., Schoenmakers, B.: On Second-Order Differential Power Analysis. In: CHES, vol. 3659 of LNCS, pp. 293–308. Springer, Edinburgh, UK, August 29 – September 1st (2005)
27.
Zurück zum Zitat Lerman, L., Poussier, R., Bontempi, G., Markowitch, O., Standaert, F.-X.: Template attacks vs. machine learning revisited (and the curse of dimensionality in side-channel analysis). In Mangard, S., Poschmann A.Y. (eds), Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers, vol. 9064 of Lecture Notes in Computer Science, pp. 20–33. Springer (2015) Lerman, L., Poussier, R., Bontempi, G., Markowitch, O., Standaert, F.-X.: Template attacks vs. machine learning revisited (and the curse of dimensionality in side-channel analysis). In Mangard, S., Poschmann A.Y. (eds), Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers, vol. 9064 of Lecture Notes in Computer Science, pp. 20–33. Springer (2015)
28.
Zurück zum Zitat Lomné, V., Prouff, E., Roche, T.: Behind the Scene of Side Channel Attacks. In: Sako, K., Sarkar P., (eds), ASIACRYPT (1), vol. 8269 of Lecture Notes in Computer Science, pp. 506–525. Springer (2013) Lomné, V., Prouff, E., Roche, T.: Behind the Scene of Side Channel Attacks. In: Sako, K., Sarkar P., (eds), ASIACRYPT (1), vol. 8269 of Lecture Notes in Computer Science, pp. 506–525. Springer (2013)
29.
Zurück zum Zitat Maghrebi, H., Prouff, E.: On the Use of Independent Component Analysis to Denoise Side-Channel Measurements. In: Fan, J., Gierlichs, B. (eds), Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, COSADE 2018, Singapore, April 23-24, 2018, Proceedings, vol. 10815 of Lecture Notes in Computer Science, pp. 61–81. Springer (2018) Maghrebi, H., Prouff, E.: On the Use of Independent Component Analysis to Denoise Side-Channel Measurements. In: Fan, J., Gierlichs, B. (eds), Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, COSADE 2018, Singapore, April 23-24, 2018, Proceedings, vol. 10815 of Lecture Notes in Computer Science, pp. 61–81. Springer (2018)
31.
Zurück zum Zitat Messerges, T.S.: Securing the AES Finalists Against Power Analysis Attacks. In: Fast Software Encryption’00, pp. 150–164. Springer-Verlag, New York (April 2000) Messerges, T.S.: Securing the AES Finalists Against Power Analysis Attacks. In: Fast Software Encryption’00, pp. 150–164. Springer-Verlag, New York (April 2000)
32.
Zurück zum Zitat Messerges, T.S.: Securing the AES finalists against power analysis attacks. In: Schneier, B. (ed) Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000, Proceedings, vol. 1978 of Lecture Notes in Computer Science, pp. 150–164. Springer (2000) Messerges, T.S.: Securing the AES finalists against power analysis attacks. In: Schneier, B. (ed) Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000, Proceedings, vol. 1978 of Lecture Notes in Computer Science, pp. 150–164. Springer (2000)
33.
Zurück zum Zitat Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Trans. Comput. 51(5), 541–552 (2002)MathSciNetCrossRef Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Trans. Comput. 51(5), 541–552 (2002)MathSciNetCrossRef
34.
Zurück zum Zitat Di Natale, G., Flottes, M.-L., Rouzeyre, B., Valka, M., Réal, D.: Power consumption traces realignment to improve differential power analysis. In: Kraemer, R., Pawlak, A., Steininger, A., Schölzel, M., Raik, J., Vierhaus, H.T. (eds), DDECS, pp. 201–206. IEEE (2011) Di Natale, G., Flottes, M.-L., Rouzeyre, B., Valka, M., Réal, D.: Power consumption traces realignment to improve differential power analysis. In: Kraemer, R., Pawlak, A., Steininger, A., Schölzel, M., Raik, J., Vierhaus, H.T. (eds), DDECS, pp. 201–206. IEEE (2011)
35.
Zurück zum Zitat Oswald, E., Mangard, S.: Template Attacks on Masking — Resistance Is Futile. In: Abe, M. (ed), CT-RSA, vol. 4377 of Lecture Notes in Computer Science, pp. 243–256. Springer (2007) Oswald, E., Mangard, S.: Template Attacks on Masking — Resistance Is Futile. In: Abe, M. (ed), CT-RSA, vol. 4377 of Lecture Notes in Computer Science, pp. 243–256. Springer (2007)
36.
Zurück zum Zitat Prouff, E., Rivain, M., Bevan, R.: Statistical analysis of second order differential power analysis. IEEE Trans. Comput. 58(6), 799–811 (2009)MathSciNetCrossRef Prouff, E., Rivain, M., Bevan, R.: Statistical analysis of second order differential power analysis. IEEE Trans. Comput. 58(6), 799–811 (2009)MathSciNetCrossRef
37.
Zurück zum Zitat Schindler, W., Lemke, K., Paar, C.: A Stochastic Model for Differential Side Channel Cryptanalysis. In: LNCS, (ed), CHES, vol. 3659 of LNCS, pp. 30–46. Springer, Edinburgh, Scotland, UK (Sept 2005) Schindler, W., Lemke, K., Paar, C.: A Stochastic Model for Differential Side Channel Cryptanalysis. In: LNCS, (ed), CHES, vol. 3659 of LNCS, pp. 30–46. Springer, Edinburgh, Scotland, UK (Sept 2005)
38.
Zurück zum Zitat Schramm, K., Paar, C.: Higher Order Masking of the AES. In: Pointcheval, D. (ed), CT-RSA, vol. 3860 of LNCS, pp. 208–225. Springer (2006) Schramm, K., Paar, C.: Higher Order Masking of the AES. In: Pointcheval, D. (ed), CT-RSA, vol. 3860 of LNCS, pp. 208–225. Springer (2006)
39.
Zurück zum Zitat Standaert, F.-X., Archambeau, C.: Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages. In: CHES, vol. 5154 of Lecture Notes in Computer Science, pp. 411–425. Springer, Washington, D.C., USA. August 10–13 (2008) Standaert, F.-X., Archambeau, C.: Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages. In: CHES, vol. 5154 of Lecture Notes in Computer Science, pp. 411–425. Springer, Washington, D.C., USA. August 10–13 (2008)
41.
Zurück zum Zitat van Woudenberg, J.G.J., Witteman, M.F., Bakker, B.: Improving Differential Power Analysis by Elastic Alignment. In: Kiayias, A. (ed), CT-RSA, vol. 6558 of Lecture Notes in Computer Science, pp. 104–119. Springer (2011) van Woudenberg, J.G.J., Witteman, M.F., Bakker, B.: Improving Differential Power Analysis by Elastic Alignment. In: Kiayias, A. (ed), CT-RSA, vol. 6558 of Lecture Notes in Computer Science, pp. 104–119. Springer (2011)
42.
Zurück zum Zitat Williams, V.V.: Multiplying matrices faster than coppersmith-winograd. In: STOC’12 Proceedings of the forty-fourth annual ACM symposium on Theory of computing, New York, USA — May 19-22, 2012, pp. 887–898, 05 (2012) Williams, V.V.: Multiplying matrices faster than coppersmith-winograd. In: STOC’12 Proceedings of the forty-fourth annual ACM symposium on Theory of computing, New York, USA — May 19-22, 2012, pp. 887–898, 05 (2012)
43.
Zurück zum Zitat Zhang, H., Zhou, Y.: How many interesting points should be used in a template attack? J. Syst. Softw. 120, 105–113 (2016)CrossRef Zhang, H., Zhou, Y.: How many interesting points should be used in a template attack? J. Syst. Softw. 120, 105–113 (2016)CrossRef
44.
Zurück zum Zitat Zhang, H., Zhou, Y., Feng, D.: Mahalanobis distance similarity measure based distinguisher for template attack. Security Commun. Netw. 8(5), 769–777 (2015)CrossRef Zhang, H., Zhou, Y., Feng, D.: Mahalanobis distance similarity measure based distinguisher for template attack. Security Commun. Netw. 8(5), 769–777 (2015)CrossRef
45.
Zurück zum Zitat Zheng, Y., Zhou, Y., Yu, Z., Hu, C., Zhang, H.: How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice? In: Chi Kwong Hui, L., Qing, S.H., Shi, E., Yiu, S.-M. (eds), Information and Communications Security - 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers, vol. 8958 of Lecture Notes in Computer Science, pp. 200–214. Springer (2014) Zheng, Y., Zhou, Y., Yu, Z., Hu, C., Zhang, H.: How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice? In: Chi Kwong Hui, L., Qing, S.H., Shi, E., Yiu, S.-M. (eds), Information and Communications Security - 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers, vol. 8958 of Lecture Notes in Computer Science, pp. 200–214. Springer (2014)
Metadaten
Titel
On the power of template attacks in highly multivariate context
verfasst von
Maamar Ouladj
Nadia El Mrabet
Sylvain Guilley
Philippe Guillot
Gilles Millérioux
Publikationsdatum
30.08.2020
Verlag
Springer Berlin Heidelberg
Erschienen in
Journal of Cryptographic Engineering / Ausgabe 4/2020
Print ISSN: 2190-8508
Elektronische ISSN: 2190-8516
DOI
https://doi.org/10.1007/s13389-020-00239-2

Weitere Artikel der Ausgabe 4/2020

Journal of Cryptographic Engineering 4/2020 Zur Ausgabe