Skip to main content
Erschienen in: Journal of Cryptographic Engineering 4/2017

22.09.2017 | Special Section on Proofs 2016

Template attack versus Bayes classifier

verfasst von: Stjepan Picek, Annelie Heuser, Sylvain Guilley

Erschienen in: Journal of Cryptographic Engineering | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Side-channel attacks represent one of the most powerful categories of attacks on cryptographic devices with profiled attacks in a prominent place as the most powerful among them. Indeed, for instance, template attack is a well-known real-world attack that is also the most powerful attack from the information theoretical perspective. On the other hand, machine learning techniques have proved their quality in a numerous applications where one is definitely side-channel analysis. As one could expect, most of the research concerning supervised machine learning and side-channel analyses concentrated on more powerful machine learning techniques. Although valid from the practical perspective, such attacks often remain lacking from the more theoretical side. In this paper, we investigate several Bayes classifiers, which present simple supervised techniques that have significant similarities with the template attack. More specifically, our analysis aims to investigate what is the influence of the feature (in)dependence in datasets with different amount of noise and to offer further insight into the efficiency of machine learning for side-channel analysis.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
See, e.g., in the hall of fame on [22]
 
Literatur
1.
Zurück zum Zitat Kocher, P.C.: Timing attacks on implementations of Diffie–Hellman, RSA, DSS, and other systems. In: Proceedings of CRYPTO’96. LNCS, vol. 1109, pp. 104–113. Springer (1996) Kocher, P.C.: Timing attacks on implementations of Diffie–Hellman, RSA, DSS, and other systems. In: Proceedings of CRYPTO’96. LNCS, vol. 1109, pp. 104–113. Springer (1996)
2.
Zurück zum Zitat Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Proceedings of CRYPTO’99. LNCS, vol. 1666, pp. 388–397. Springer (1999) Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Proceedings of CRYPTO’99. LNCS, vol. 1666, pp. 388–397. Springer (1999)
3.
Zurück zum Zitat Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: concrete results. In: Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems. CHES ’01, pp. 251–261. Springer, London (2001) Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: concrete results. In: Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems. CHES ’01, pp. 251–261. Springer, London (2001)
4.
Zurück zum Zitat Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: CHES. LNCS, vol. 2523, pp. 13–28. Springer, San Francisco Bay (Redwood City) (2002) Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: CHES. LNCS, vol. 2523, pp. 13–28. Springer, San Francisco Bay (Redwood City) (2002)
5.
Zurück zum Zitat Heuser, A., Zohner, M.: Intelligent machine homicide—breaking cryptographic devices using support vector machines. In: Schindler, W., Huss, S.A., (eds.) COSADE. LNCS, vol. 7275, pp. 249–264. Springer (2012) Heuser, A., Zohner, M.: Intelligent machine homicide—breaking cryptographic devices using support vector machines. In: Schindler, W., Huss, S.A., (eds.) COSADE. LNCS, vol. 7275, pp. 249–264. Springer (2012)
6.
Zurück zum Zitat Hospodar, G., Gierlichs, B., De Mulder, E., Verbauwhede, I., Vandewalle, J.: Machine learning in side-channel analysis: a first study. J. Cryptogr. Eng. 1, 293–302 (2011)CrossRef Hospodar, G., Gierlichs, B., De Mulder, E., Verbauwhede, I., Vandewalle, J.: Machine learning in side-channel analysis: a first study. J. Cryptogr. Eng. 1, 293–302 (2011)CrossRef
7.
Zurück zum Zitat Lerman, L., Bontempi, G., Markowitch, O.: Power analysis attack: an approach based on machine learning. Int. J. Appl. Cryptol. 3(2), 97–115 (2014)MathSciNetCrossRefMATH Lerman, L., Bontempi, G., Markowitch, O.: Power analysis attack: an approach based on machine learning. Int. J. Appl. Cryptol. 3(2), 97–115 (2014)MathSciNetCrossRefMATH
8.
Zurück zum Zitat Lerman, L., Poussier, R., Bontempi, G., Markowitch, O., Standaert, F.: Template attacks vs. machine learning revisited (and the curse of dimensionality in side-channel analysis). In: Mangard, S., Poschmann, A.Y., (eds.) Constructive Side-Channel Analysis and Secure Design—6th International Workshop, COSADE 2015, 13–14 Apr 2015. Revised selected papers, Lecture notes in computer science, vol. 9064, pp. 20–33. Springer, Berlin (2015) Lerman, L., Poussier, R., Bontempi, G., Markowitch, O., Standaert, F.: Template attacks vs. machine learning revisited (and the curse of dimensionality in side-channel analysis). In: Mangard, S., Poschmann, A.Y., (eds.) Constructive Side-Channel Analysis and Secure Design—6th International Workshop, COSADE 2015, 13–14 Apr 2015. Revised selected papers, Lecture notes in computer science, vol. 9064, pp. 20–33. Springer, Berlin (2015)
9.
Zurück zum Zitat Lerman, L., Bontempi, G., Markowitch, O.: A machine learning approach against a masked AES—reaching the limit of side-channel attacks with a learning model. J. Cryptogr. Eng. 5(2), 123–139 (2015)CrossRef Lerman, L., Bontempi, G., Markowitch, O.: A machine learning approach against a masked AES—reaching the limit of side-channel attacks with a learning model. J. Cryptogr. Eng. 5(2), 123–139 (2015)CrossRef
10.
Zurück zum Zitat Lerman, L., Medeiros, S.F., Bontempi, G., Markowitch, O.: A machine learning approach against a masked AES. In: CARDIS. Lecture Notes in Computer Science, Springer, Berlin (2013) Lerman, L., Medeiros, S.F., Bontempi, G., Markowitch, O.: A machine learning approach against a masked AES. In: CARDIS. Lecture Notes in Computer Science, Springer, Berlin (2013)
11.
Zurück zum Zitat Heuser, A., Picek, S., Guilley, S., Mentens, N.: Side-channel analysis of lightweight ciphers: does lightweight equal easy? In: RFIDSec. (2016) Heuser, A., Picek, S., Guilley, S., Mentens, N.: Side-channel analysis of lightweight ciphers: does lightweight equal easy? In: RFIDSec. (2016)
12.
Zurück zum Zitat Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. In: International Conference on Security, Privacy, and Applied Cryptography Engineering, pp. 3–26. Springer (2016) Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. In: International Conference on Security, Privacy, and Applied Cryptography Engineering, pp. 3–26. Springer (2016)
13.
Zurück zum Zitat Picek, S., Heuser, A., Jovic, A., Legay, A.: Climbing down the hierarchy: hierarchical classification for machine learning side-channel attacks, In: International Conference on Cryptology in Africa. pp. 61–78 (2017) Picek, S., Heuser, A., Jovic, A., Legay, A.: Climbing down the hierarchy: hierarchical classification for machine learning side-channel attacks, In: International Conference on Cryptology in Africa. pp. 61–78 (2017)
14.
Zurück zum Zitat Picek, S., Heuser, A., Jović, A., Ludwig, S.A., Guilley, S., Jakobović, D., Mentens, N.: Side-channel analysis and machine learning: a practical perspective. In: IEEE International Joint Conference on Neural Networks (IJCNN). pp. 4095–4102 (2017) Picek, S., Heuser, A., Jović, A., Ludwig, S.A., Guilley, S., Jakobović, D., Mentens, N.: Side-channel analysis and machine learning: a practical perspective. In: IEEE International Joint Conference on Neural Networks (IJCNN). pp. 4095–4102 (2017)
15.
Zurück zum Zitat Wolpert, D.H.: The lack of a priori distinctions between learning algorithms. Neural Comput. 8(7), 1341–1390 (1996)CrossRef Wolpert, D.H.: The lack of a priori distinctions between learning algorithms. Neural Comput. 8(7), 1341–1390 (1996)CrossRef
16.
Zurück zum Zitat Friedman, N., Geiger, D., Goldszmidt, M.: Bayesian network classifiers. Mach. Learn. 29(2), 131–163 (1997)CrossRefMATH Friedman, N., Geiger, D., Goldszmidt, M.: Bayesian network classifiers. Mach. Learn. 29(2), 131–163 (1997)CrossRefMATH
17.
Zurück zum Zitat Choudary, O., Kuhn, M.G.: Efficient template attacks. In: Francillon, A., Rohatgi, P., (eds.) Smart Card Research and Advanced Applications—12th International Conference, CARDIS 2013, 27–29 Nov 2013. Revised selected papers, LNCS, vol. 8419, pp. 253–270. Springer, Berlin (2013) Choudary, O., Kuhn, M.G.: Efficient template attacks. In: Francillon, A., Rohatgi, P., (eds.) Smart Card Research and Advanced Applications—12th International Conference, CARDIS 2013, 27–29 Nov 2013. Revised selected papers, LNCS, vol. 8419, pp. 253–270. Springer, Berlin (2013)
18.
Zurück zum Zitat Zheng, Z., Webb, G.I.: Lazy learning of Bayesian rules. Mach. Learn. 41(1), 53–84 (2000)CrossRef Zheng, Z., Webb, G.I.: Lazy learning of Bayesian rules. Mach. Learn. 41(1), 53–84 (2000)CrossRef
19.
Zurück zum Zitat Keogh, E.J., Pazzani, M.J.: Learning augmented Bayesian classifiers: a comparison of distribution-based and classification-based approaches. In: Proceedings of the 7th International Workshop on AI and Statistics, pp 225–230 (1999) Keogh, E.J., Pazzani, M.J.: Learning augmented Bayesian classifiers: a comparison of distribution-based and classification-based approaches. In: Proceedings of the 7th International Workshop on AI and Statistics, pp 225–230 (1999)
20.
Zurück zum Zitat Webb, I.G., Boughton, R.J., Wang, Z.: Not so Naive Bayes: aggregating one-dependence estimators. Mach. Learn. 58(1), 5–24 (2005)CrossRefMATH Webb, I.G., Boughton, R.J., Wang, Z.: Not so Naive Bayes: aggregating one-dependence estimators. Mach. Learn. 58(1), 5–24 (2005)CrossRefMATH
21.
Zurück zum Zitat Webb, G.I., Boughton, J.R., Zheng, F., Ting, K.M., Salem, H.: Learning by extrapolation from marginal to full-multivariate probability distributions: decreasingly naive Bayesian classification. Mach. Learn. 86(2), 233–272 (2012)MathSciNetCrossRefMATH Webb, G.I., Boughton, J.R., Zheng, F., Ting, K.M., Salem, H.: Learning by extrapolation from marginal to full-multivariate probability distributions: decreasingly naive Bayesian classification. Mach. Learn. 86(2), 233–272 (2012)MathSciNetCrossRefMATH
24.
Zurück zum Zitat Powers, D.M.W.: Evaluation: from precision, recall and F-factor to ROC, informedness, markedness and correlation. Int. J. Mach. Learn. Technol. 2(1), 37–63 (2011)MathSciNetCrossRef Powers, D.M.W.: Evaluation: from precision, recall and F-factor to ROC, informedness, markedness and correlation. Int. J. Mach. Learn. Technol. 2(1), 37–63 (2011)MathSciNetCrossRef
25.
Zurück zum Zitat Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. SIGKDD Explor. Newsl. 11(1), 10–18 (2009)CrossRef Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. SIGKDD Explor. Newsl. 11(1), 10–18 (2009)CrossRef
26.
Zurück zum Zitat Cestnik, B.: Estimating probabilities: a crucial task in machine learning. In: Proceendings of the European Conference on Artificial Intelligence. (1990) Cestnik, B.: Estimating probabilities: a crucial task in machine learning. In: Proceendings of the European Conference on Artificial Intelligence. (1990)
Metadaten
Titel
Template attack versus Bayes classifier
verfasst von
Stjepan Picek
Annelie Heuser
Sylvain Guilley
Publikationsdatum
22.09.2017
Verlag
Springer Berlin Heidelberg
Erschienen in
Journal of Cryptographic Engineering / Ausgabe 4/2017
Print ISSN: 2190-8508
Elektronische ISSN: 2190-8516
DOI
https://doi.org/10.1007/s13389-017-0172-7

Weitere Artikel der Ausgabe 4/2017

Journal of Cryptographic Engineering 4/2017 Zur Ausgabe