Standaert, François-Xavier
[UCL]
Koeune, François
[UCL]
Schindler, W.
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this scenario, an adversary first uses a device under his control in order to build a good leakage model. Then, he takes advantage of this leakage model to exploit the actual leakages of a similar target device and perform a key recovery. Since such attacks are divided in two phases (namely profiling and online attack), the question of how to best evaluate those two phases arises. In this paper, we take advantage of a recently introduced framework for the analysis of side-channel attacks to tackle this issue. We show that the quality of a profiling phase is nicely captured by an information theoretic metric. By contrast, the effectiveness of the online key recovery phase is better measured with a security metric. As an illustration, we use this methodology to compare the two main techniques for profiled side-channel attacks, namely template attacks and stochastic models. Our results confirm the higher profiling efficiency of stochastic models when reasonable assumptions can be made about the leakages of a device.
- Chari Suresh, Rao Josyula R., Rohatgi Pankaj, Template Attacks, Cryptographic Hardware and Embedded Systems - CHES 2002 (2003) ISBN:9783540004097 p.13-28, 10.1007/3-540-36400-5_3
- Gierlichs Benedikt, Lemke-Rust Kerstin, Paar Christof, Templates vs. Stochastic Methods, Lecture Notes in Computer Science (2006) ISBN:9783540465591 p.15-29, 10.1007/11894063_2
- Lemke-Rust Kerstin, Paar Christof, Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods, Computer Security – ESORICS 2007 ISBN:9783540748342 p.454-468, 10.1007/978-3-540-74835-9_30
- Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks. Springer, Heidelberg (2007)
- Schindler Werner, Lemke Kerstin, Paar Christof, A Stochastic Model for Differential Side Channel Cryptanalysis, Cryptographic Hardware and Embedded Systems – CHES 2005 (2005) ISBN:9783540284741 p.30-46, 10.1007/11545262_3
- Schindler Werner, Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking, 10.1515/jmc.2008.013
- Standaert, F.-X., Malkin, T.G., Yung, M.: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. To appear in the proceedings of Eurocrypt (2009); Extended version available from: Cryptology ePrint Archive, Report 2006/139
- Standaert F. -X., Peeters E., Archambeau C., Quisquater J. -J., Towards Security Limits in Side-Channel Attacks, Lecture Notes in Computer Science (2006) ISBN:9783540465591 p.30-45, 10.1007/11894063_3
- Standaert François-Xavier, Archambeau Cedric, Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages, Cryptographic Hardware and Embedded Systems – CHES 2008 ISBN:9783540850526 p.411-425, 10.1007/978-3-540-85053-3_26
Bibliographic reference |
Standaert, François-Xavier ; Koeune, François ; Schindler, W.. How to compare profiled side-channel attacks?.Annual Applied Cryptography and Network Security. 7th Annual Conference on Applied Cryptography and Network Security (Paris-Rocquencourt, France, 2-5 June 2009). In: Abdalla, M.; Pointcheval, D.; Fouque, P.-A.; Vergnaud, D.;, Annual Applied Cryptography and Network Security. 7th Annual Conference on Applied Cryptography and Network Security, Springer verlag2009, p. 485-498 |
Permanent URL |
http://hdl.handle.net/2078.1/67528 |