Choudary, Marios O.
[University Politehnica of Bucharest/Romania]
Poussier, Romain
[UCL]
Standaert, François-Xavier
[UCL]
The fair evaluation of leaking devices generally requires to come with the best possible distinguishers to extract and exploit side-channel information. While the need of a sound model for the leakages is a well known issue, the risks of additional errors in the post-processing of the attack results (with key enumeration/key rank estimation) are less investigated. Namely, optimal post-processing is known to be possible with distinguishers outputting probabilities (e.g. template attacks), but the impact of a deviation from this context has not been quantified so far. We therefore provide a consolidating experimental analysis in this direction, based on simulated and actual measurements. Our main conclusions are twofold. We first show that the concrete impact of heuristic scores such as produced with a correlation power analysis can lead to non-negligible post-processing errors. We then show that such errors can be mitigated in practice, with Bayesian extensions or specialized distinguishers (e.g. on-the-fly linear regression).
- Bernstein, D.J., Lange, T., van Vredendaal, C.: Tighter, faster, simpler side-channel security evaluations beyond computing power. IACR Cryptology ePrint Archive, 2015:221 (2015)
- Bogdanov, A., Kizhvatov, I., Manzoor, K., Tischhauser, E., Witteman, M.: Fast and memory-efficient key recovery in side-channel attacks. IACR Cryptology ePrint Archive, 2015:795 (2015)
- Brier Eric, Clavier Christophe, Olivier Francis, Correlation Power Analysis with a Leakage Model, Lecture Notes in Computer Science (2004) ISBN:9783540226666 p.16-29, 10.1007/978-3-540-28632-5_2
- Chari Suresh, Rao Josyula R., Rohatgi Pankaj, Template Attacks, Cryptographic Hardware and Embedded Systems - CHES 2002 (2003) ISBN:9783540004097 p.13-28, 10.1007/3-540-36400-5_3
- Choudary Omar, Kuhn Markus G., Efficient Template Attacks, Smart Card Research and Advanced Applications (2014) ISBN:9783319083018 p.253-270, 10.1007/978-3-319-08302-5_17
- David, L., Wool, A.: A bounded-space near-optimal key enumeration algorithm for multi-dimensional side-channel attacks. IACR Cryptology ePrint Archive, 2015:1236 (2015)
- Doget Julien, Prouff Emmanuel, Rivain Matthieu, Standaert François-Xavier, Univariate side channel attacks and leakage modeling, 10.1007/s13389-011-0010-2
- Duc Alexandre, Faust Sebastian, Standaert François-Xavier, Making Masking Security Proofs Concrete, Advances in Cryptology -- EUROCRYPT 2015 (2015) ISBN:9783662467992 p.401-429, 10.1007/978-3-662-46800-5_16
- Durvaux François, Standaert François-Xavier, Veyrat-Charvillon Nicolas, How to Certify the Leakage of a Chip?, Advances in Cryptology – EUROCRYPT 2014 (2014) ISBN:9783642552199 p.459-476, 10.1007/978-3-642-55220-5_26
- Glowacz Cezary, Grosso Vincent, Poussier Romain, Schüth Joachim, Standaert François-Xavier, Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment, Fast Software Encryption (2015) ISBN:9783662481158 p.117-129, 10.1007/978-3-662-48116-5_6
- Kocher Paul, Jaffe Joshua, Jun Benjamin, Differential Power Analysis, Advances in Cryptology — CRYPTO’ 99 (1999) ISBN:9783540663478 p.388-397, 10.1007/3-540-48405-1_25
- Longo, J., Martin, D.P., Mather, L., Oswald, E., Sach, B., Stam, M.: How low can you go? using side-channel data to enhance brute-force key recovery. Cryptology ePrint Archive, Report 2016/609 (2016). http://eprint.iacr.org/
- Mangard Stefan, Hardware Countermeasures against DPA – A Statistical Analysis of Their Effectiveness, Topics in Cryptology – CT-RSA 2004 (2004) ISBN:9783540209966 p.222-235, 10.1007/978-3-540-24660-2_18
- Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)
- Mangard S., Oswald E., Standaert F.-X., One for all – all for one: unifying standard differential power analysis attacks, 10.1049/iet-ifs.2010.0096
- Martin, D.P., Mather, L., Oswald, E., Stam, M.: Characterisation and estimation of the key rank distribution in the context of side channel evaluations. IACR Cryptology ePrint Archive, 2016:491 (2016)
- Martin Daniel P., O’Connell Jonathan F., Oswald Elisabeth, Stam Martijn, Counting Keys in Parallel After a Side Channel Attack, Advances in Cryptology – ASIACRYPT 2015 (2015) ISBN:9783662487990 p.313-337, 10.1007/978-3-662-48800-3_13
- Poussier Romain, Grosso Vincent, Standaert François-Xavier, Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations, Smart Card Research and Advanced Applications (2016) ISBN:9783319312705 p.125-142, 10.1007/978-3-319-31271-2_8
- Poussier, R., Standaert, F.-X., Grosso, V.: Simple key enumeration (and rank estimation) using histograms: an integrated approach. IACR Cryptology ePrint Archive, 2016:571 (2016)
- Schindler Werner, Lemke Kerstin, Paar Christof, A Stochastic Model for Differential Side Channel Cryptanalysis, Cryptographic Hardware and Embedded Systems – CHES 2005 (2005) ISBN:9783540284741 p.30-46, 10.1007/11545262_3
- Veyrat-Charvillon Nicolas, Gérard Benoît, Renauld Mathieu, Standaert François-Xavier, An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks, Selected Areas in Cryptography (2013) ISBN:9783642359989 p.390-406, 10.1007/978-3-642-35999-6_25
- Veyrat-Charvillon Nicolas, Gérard Benoît, Standaert François-Xavier, Security Evaluations beyond Computing Power, Advances in Cryptology – EUROCRYPT 2013 (2013) ISBN:9783642383472 p.126-141, 10.1007/978-3-642-38348-9_8
- Ye Xin, Eisenbarth Thomas, Martin William, Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery, Smart Card Research and Advanced Applications (2015) ISBN:9783319167626 p.215-232, 10.1007/978-3-319-16763-3_13
Bibliographic reference |
Choudary, Marios O. ; Poussier, Romain ; Standaert, François-Xavier. Score-Based vs. Probability-Based Enumeration - A Cautionary Note.17th International Conference in Cryptology in India - Progress in cryptology (INDIACRYPT 2016) (Kolkata (India), du 11/12/2016 au 14/12/2016). In: Orr Dunkelman, Somitra Kumar Sanadhya, Proceedings of the 17th International Conference in Cryptology in India - Progress in cryptology (INDIACRYPT 2016), Springer2016, p. 137-152 |
Permanent URL |
http://hdl.handle.net/2078.1/181829 |