Bruneau, Nicolas
[Institut Mines-Télécom, Télécom ParisTech/France]
Guilley, Sylvain
[Institut Mines-Télécom, Télécom ParisTech/France]
Heuser, Annelie
[Institut Mines-Télécom, Télécom ParisTech/France]
Rioul, Olivier
[Institut Mines-Télécom, Télécom ParisTech/France]
Standaert, François-Xavier
[UCL]
Teglia, Yannick
[Gemalto, Security Labs, La Ciotat/France]
The maximum likelihood side-channel distinguisher of a template attack scenario is expanded into lower degree attacks according to the increasing powers of the signal-to-noise ratio (SNR). By exploiting this decomposition we show that it is possible to build highly multivariate attacks which remain efficient when the likelihood cannot be computed in practice due to its computational complexity. The shuffled table recomputation is used as an illustration to derive a new attack which outperforms the ones presented by Bruneau et al. at CHES 2015, and so across the full range of SNRs. This attack combines two attack degrees and is able to exploit high dimensional leakage which explains its efficiency.
- Akkar Mehdi-Laurent, Giraud Christophe, An Implementation of DES and AES, Secure against Some Attacks, Cryptographic Hardware and Embedded Systems — CHES 2001 (2001) ISBN:9783540425212 p.309-318, 10.1007/3-540-44709-1_26
- Batina Lejla, Gierlichs Benedikt, Prouff Emmanuel, Rivain Matthieu, Standaert François-Xavier, Veyrat-Charvillon Nicolas, Mutual Information Analysis: a Comprehensive Study, 10.1007/s00145-010-9084-8
- Blömer Johannes, Guajardo Jorge, Krummel Volker, Provably Secure Masking of AES, Selected Areas in Cryptography (2004) ISBN:9783540243274 p.69-83, 10.1007/978-3-540-30564-4_5
- Bruneau Nicolas, Danger Jean-Luc, Guilley Sylvain, Heuser Annelie, Teglia Yannick, Boosting Higher-Order Correlation Attacks by Dimensionality Reduction, Security, Privacy, and Applied Cryptography Engineering (2014) ISBN:9783319120591 p.183-200, 10.1007/978-3-319-12060-7_13
- Bruneau, N., Guilley, S., Heuser, A., Marion, D., Rioul, O.: Less is more dimensionality reduction from a theoretical perspective. In: Handschuh and Güneysu [13]
- Bruneau Nicolas, Guilley Sylvain, Heuser Annelie, Rioul Olivier, Masks Will Fall Off, Lecture Notes in Computer Science (2014) ISBN:9783662456071 p.344-365, 10.1007/978-3-662-45608-8_19
- Bruneau, N., Guilley, S., Najm, Z., Teglia, Y.: Multivariate high-order attacks of shuffled tables recomputation. In: Handschuh and Güneysu [13]
- Chari Suresh, Jutla Charanjit S., Rao Josyula R., Rohatgi Pankaj, Towards Sound Approaches to Counteract Power-Analysis Attacks, Advances in Cryptology — CRYPTO’ 99 (1999) ISBN:9783540663478 p.398-412, 10.1007/3-540-48405-1_26
- Clavier Christophe, Coron Jean-Sébastien, Dabbous Nora, Differential Power Analysis in the Presence of Hardware Countermeasures, Cryptographic Hardware and Embedded Systems — CHES 2000 (2000) ISBN:9783540414551 p.252-263, 10.1007/3-540-44499-8_20
- Coron Jean-Sébastien, Higher Order Masking of Look-Up Tables, Advances in Cryptology – EUROCRYPT 2014 (2014) ISBN:9783642552199 p.441-458, 10.1007/978-3-642-55220-5_25
- Ding A. Adam, Zhang Liwei, Fei Yunsi, Luo Pei, A Statistical Model for Higher Order DPA on Masked Devices, Lecture Notes in Computer Science (2014) ISBN:9783662447086 p.147-169, 10.1007/978-3-662-44709-3_9
- Duc Alexandre, Faust Sebastian, Standaert François-Xavier, Making Masking Security Proofs Concrete, Advances in Cryptology -- EUROCRYPT 2015 (2015) ISBN:9783662467992 p.401-429, 10.1007/978-3-662-46800-5_16
- Güneysu, T., Handschuh, H. (eds.): CHES 2015. LNCS, vol. 9293. Springer, Heidelberg (2015)
- Herbst Christoph, Oswald Elisabeth, Mangard Stefan, An AES Smart Card Implementation Resistant to Power Analysis Attacks, Applied Cryptography and Network Security (2006) ISBN:9783540347033 p.239-252, 10.1007/11767480_16
- Ishai Yuval, Sahai Amit, Wagner David, Private Circuits: Securing Hardware against Probing Attacks, Advances in Cryptology - CRYPTO 2003 (2003) ISBN:9783540406747 p.463-481, 10.1007/978-3-540-45146-4_27
- Lemke-Rust Kerstin, Paar Christof, Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods, Computer Security – ESORICS 2007 ISBN:9783540748342 p.454-468, 10.1007/978-3-540-74835-9_30
- Lemke-Rust Kerstin, Paar Christof, Gaussian Mixture Models for Higher-Order Side Channel Analysis, Cryptographic Hardware and Embedded Systems - CHES 2007 ISBN:9783540747345 p.14-27, 10.1007/978-3-540-74735-2_2
- Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)
- Messerges Thomas S., Securing the AES Finalists Against Power Analysis Attacks, Fast Software Encryption (2001) ISBN:9783540417286 p.150-164, 10.1007/3-540-44706-7_11
- Messerges Thomas S., Using Second-Order Power Analysis to Attack DPA Resistant Software, Cryptographic Hardware and Embedded Systems — CHES 2000 (2000) ISBN:9783540414551 p.238-251, 10.1007/3-540-44499-8_19
- Moradi Amir, Statistical Tools Flavor Side-Channel Collision Attacks, Advances in Cryptology – EUROCRYPT 2012 (2012) ISBN:9783642290107 p.428-445, 10.1007/978-3-642-29011-4_26
- Moradi, A., Standaert, F.X.: Moments-correlating DPA. IACR Cryptology ePrint Archive 2014, p. 409, 2 June 2014
- Moradi Amir, Wild Alexander, Assessment of Hiding the Higher-Order Leakages in Hardware, Lecture Notes in Computer Science (2015) ISBN:9783662483237 p.453-474, 10.1007/978-3-662-48324-4_23
- Nikova Svetla, Rijmen Vincent, Schläffer Martin, Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches, 10.1007/s00145-010-9085-7
- Oswald Elisabeth, Mangard Stefan, Template Attacks on Masking—Resistance Is Futile, Lecture Notes in Computer Science (2006) ISBN:9783540693277 p.243-256, 10.1007/11967668_16
- Pan J., den Hartog J. I., Lu Jiqiang, You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation, Information Security Applications (2009) ISBN:9783642108372 p.178-192, 10.1007/978-3-642-10838-9_14
- Peeters Eric, Standaert François-Xavier, Donckers Nicolas, Quisquater Jean-Jacques, Improved Higher-Order Side-Channel Attacks with FPGA Experiments, Cryptographic Hardware and Embedded Systems – CHES 2005 (2005) ISBN:9783540284741 p.309-323, 10.1007/11545262_23
- Prouff Emmanuel, Rivain Matthieu, A Generic Method for Secure SBox Implementation, Information Security Applications (2007) ISBN:9783540775348 p.227-244, 10.1007/978-3-540-77535-5_17
- Prouff E., Rivain M., Bevan R., Statistical Analysis of Second Order Differential Power Analysis, 10.1109/tc.2009.15
- Rivain Matthieu, Prouff Emmanuel, Provably Secure Higher-Order Masking of AES, Cryptographic Hardware and Embedded Systems, CHES 2010 (2010) ISBN:9783642150302 p.413-427, 10.1007/978-3-642-15031-9_28
- Rivain Matthieu, Prouff Emmanuel, Doget Julien, Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers, Lecture Notes in Computer Science (2009) ISBN:9783642041372 p.171-188, 10.1007/978-3-642-04138-9_13
- Standaert François-Xavier, Malkin Tal G., Yung Moti, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, Advances in Cryptology - EUROCRYPT 2009 (2009) ISBN:9783642010002 p.443-461, 10.1007/978-3-642-01001-9_26
- Standaert François-Xavier, Veyrat-Charvillon Nicolas, Oswald Elisabeth, Gierlichs Benedikt, Medwed Marcel, Kasper Markus, Mangard Stefan, The World Is Not Enough: Another Look on Second-Order DPA, Advances in Cryptology - ASIACRYPT 2010 (2010) ISBN:9783642173721 p.112-129, 10.1007/978-3-642-17373-8_7
- Stuart, A., Ord, K.: Kendall’s Advanced Theory of Statistics: Distribution Theory, 6th edn. Wiley-Blackwell, New York (1994). ISBN-10: 0470665300; ISBN-13: 978-0470665305
- TELECOM ParisTech SEN research group. DPA Contest, 4th edn., 2013–2014. http://www.DPAcontest.org/v4/
- Tunstall Michael, Whitnall Carolyn, Oswald Elisabeth, Masking Tables—An Underestimated Security Risk, Fast Software Encryption (2014) ISBN:9783662439326 p.425-444, 10.1007/978-3-662-43933-3_22
- Veyrat-Charvillon Nicolas, Medwed Marcel, Kerckhof Stéphanie, Standaert François-Xavier, Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note, Advances in Cryptology – ASIACRYPT 2012 (2012) ISBN:9783642349607 p.740-757, 10.1007/978-3-642-34961-4_44
- Waddle Jason, Wagner David, Towards Efficient Second-Order Power Analysis, Lecture Notes in Computer Science (2004) ISBN:9783540226666 p.1-15, 10.1007/978-3-540-28632-5_1
- Weisstein, E.W.: Cumulant. From MathWorld A Wolfram Web Resource. http://mathworld.wolfram.com/Cumulant.html
Bibliographic reference |
Bruneau, Nicolas ; Guilley, Sylvain ; Heuser, Annelie ; Rioul, Olivier ; Standaert, François-Xavier ; et. al. Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.22nd International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2016) (Hanoi (Vietnam), du 04/12/2016 au 08/12/2016). In: Junhg Hee Cheon, Tsuyoshi Takagi, Proceedings of the 22nd International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2016), Springer2016, p. 573-601 |
Permanent URL |
http://hdl.handle.net/2078.1/181828 |