Moradi, Amir
[Ruhr-Universität Bochum, Germany]
Standaert, François-Xavier
[UCL]
We generalize correlation-enhanced power analysis collision attacks into moments-correlating DPA. The resulting distinguisher is applicable to the profiled and non-profiled (collision) settings and is able to exploit information lying in any statistical moment. It also benefits from a simple rule-of-thumb to estimate its data complexity. Experimental results show that such a tool allows answering with confidence to some important questions regarding the design of side-channel countermeasures (e.g. what is the most informative statistical moment in the leakages of a threshold implementation). We further argue that moments-correlating DPA is a natural candidate for leakage detection tests, enjoying the simplicity of correlation power analysis and advanced features for the evaluation of higher-order attacks with an easy-to-compute confidence level.
- Adrian Thillard, Emmanuel Prouff, and Thomas Roche. Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack. In Guido Bertoni and Jean-Sébastien Coron, editors, CHES, volume 8086 of Lecture Notes in Computer Science, pages 21--36. Springer, 2013.
- François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, and Stefan Mangard. The World Is Not Enough: Another Look on Second-Order DPA. In Masayuki Abe, editor, ASIACRYPT, volume 6477 of Lecture Notes in Computer Science, pages 112--129. Springer, 2010.
- Standaert François-Xavier, Malkin Tal G., Yung Moti, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, Advances in Cryptology - EUROCRYPT 2009 (2009) ISBN:9783642010002 p.443-461, 10.1007/978-3-642-01001-9_26
- Standaert O.-X., Peeters E., Rouvroy G., Quisquater J.-J., An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays, 10.1109/jproc.2005.862437
- Schramm Kai, Wollinger Thomas, Paar Christof, A New Class of Collision Attacks and Its Application to DES, Fast Software Encryption (2003) ISBN:9783540204497 p.206-222, 10.1007/978-3-540-39887-5_16
- Schneider Tobias, Moradi Amir, Leakage assessment methodology : Extended version, 10.1007/s13389-016-0120-y
- Renauld Mathieu, Standaert François-Xavier, Veyrat-Charvillon Nicolas, Kamel Dina, Flandre Denis, A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices, Advances in Cryptology – EUROCRYPT 2011 (2011) ISBN:9783642204647 p.109-128, 10.1007/978-3-642-20465-4_8
- Emmanuel Prouff and Patrick Schaumont, editors. Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9--12, 2012. Proceedings, volume 7428 of Lecture Notes in Computer Science. Springer, 2012.
- Prouff E., Rivain M., Bevan R., Statistical Analysis of Second Order Differential Power Analysis, 10.1109/tc.2009.15
- Merino Del Pozo Santos, Standaert François-Xavier, Blind Source Separation from Single Measurements Using Singular Spectrum Analysis, Lecture Notes in Computer Science (2015) ISBN:9783662483237 p.42-59, 10.1007/978-3-662-48324-4_3
- Axel Poschmann, Amir Moradi, Khoongming Khoo, Chu-Wee Lim, Huaxiong Wang, and San Ling. Side-Channel Resistant Crypto for Less than 2,300 GE. J. Cryptology, 24(2):322--345, 2011.
- Kenneth G. Paterson, editor. Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15--19, 2011. Proceedings, volume 6632 of Lecture Notes in Computer Science. Springer, 2011.
- Nikova Svetla, Rijmen Vincent, Schläffer Martin, Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches, 10.1007/s00145-010-9085-7
- Morita Tech. Side-channel Attack Standard Evaluation Board (SASEBO). http://www.morita-tech.co.jp/SAKURA/en/index.html.
- Amir Moradi and Alexander Wild. Assessment of hiding the higher-order leakages in hardware - what are the achievements versus overheads? In Güneysu and Handschuh citeDBLP:conf/ches/2015, pages 453--474.
- Moradi Amir, Poschmann Axel, Ling San, Paar Christof, Wang Huaxiong, Pushing the Limits: A Very Compact and a Threshold Implementation of AES, Advances in Cryptology – EUROCRYPT 2011 (2011) ISBN:9783642204647 p.69-88, 10.1007/978-3-642-20465-4_6
- Moradi A., Mischke O., Paar C., One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores, 10.1109/tc.2012.154
- Moradi Amir, Mischke Oliver, Paar Christof, Practical evaluation of DPA countermeasures on reconfigurable hardware, 10.1109/hst.2011.5955014
- Moradi Amir, Mischke Oliver, Eisenbarth Thomas, Correlation-Enhanced Power Analysis Collision Attack, Cryptographic Hardware and Embedded Systems, CHES 2010 (2010) ISBN:9783642150302 p.125-139, 10.1007/978-3-642-15031-9_9
- Amir Moradi and Oliver Mischke. How Far Should Theory Be from Practice? - Evaluation of a Countermeasure. In Prouff and SchaumontciteDBLP:conf/ches/2012, pages 92--106.
- Moradi Amir, Immler Vincent, Early Propagation and Imbalanced Routing, How to Diminish in FPGAs, Lecture Notes in Computer Science (2014) ISBN:9783662447086 p.598-615, 10.1007/978-3-662-44709-3_33
- Moradi Amir, Statistical Tools Flavor Side-Channel Collision Attacks, Advances in Cryptology – EUROCRYPT 2012 (2012) ISBN:9783642290107 p.428-445, 10.1007/978-3-642-29011-4_26
- Mather Luke, Oswald Elisabeth, Bandenburg Joe, Wójcik Marcin, Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests, Advances in Cryptology - ASIACRYPT 2013 (2013) ISBN:9783642420320 p.486-505, 10.1007/978-3-642-42033-7_25
- Mangard Stefan, Popp Thomas, Gammel Berndt M., Side-Channel Leakage of Masked CMOS Gates, Lecture Notes in Computer Science (2005) ISBN:9783540243991 p.351-365, 10.1007/978-3-540-30574-3_24
- Mangard S., Oswald E., Standaert F.-X., One for all – all for one: unifying standard differential power analysis attacks, 10.1049/iet-ifs.2010.0096
- Mangard Stefan, Hardware Countermeasures against DPA – A Statistical Analysis of Their Effectiveness, Topics in Cryptology – CT-RSA 2004 (2004) ISBN:9783540209966 p.222-235, 10.1007/978-3-540-24660-2_18
- Tim Güneysu and Helena Handschuh, editors. Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13--16, 2015, Proceedings, volume 9293 of Lecture Notes in Computer Science. Springer, 2015.
- Vincent Grosso, François-Xavier Standaert, and Emmanuel Prouff. Low entropy masking schemes, revisited. In Aurélien Francillon and Pankaj Rohatgi, editors, Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27--29, 2013. Revised Selected Papers, volume 8419 of Lecture Notes in Computer Science, pages 33--43. Springer, 2013.
- Gornik Andreas, Moradi Amir, Oehm Jurgen, Paar Christof, A Hardware-Based Countermeasure to Reduce Side-Channel Leakage: Design, Implementation, and Evaluation, 10.1109/tcad.2015.2423274
- Gérard Benoît, Standaert François-Xavier, Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting, Cryptographic Hardware and Embedded Systems – CHES 2012 (2012) ISBN:9783642330261 p.175-192, 10.1007/978-3-642-33027-8_11
- Fei Yunsi, Luo Qiasi, Ding A. Adam, A Statistical Model for DPA with Novel Algorithmic Confusion Analysis, Cryptographic Hardware and Embedded Systems – CHES 2012 (2012) ISBN:9783642330261 p.233-250, 10.1007/978-3-642-33027-8_14
- Durvaux François, Standaert François-Xavier, Veyrat-Charvillon Nicolas, Mairy Jean-Baptiste, Deville Yves, Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits, Constructive Side-Channel Analysis and Secure Design (2015) ISBN:9783319214757 p.34-50, 10.1007/978-3-319-21476-4_3
- Durvaux François, Standaert François-Xavier, From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces, Advances in Cryptology – EUROCRYPT 2016 (2016) ISBN:9783662498897 p.240-262, 10.1007/978-3-662-49890-3_10
- François Durvaux and François-Xavier Standaert. Towards easy leakage certification. IACR Cryptology ePrint Archive, 2015:537, 2015.
- Durvaux François, Standaert François-Xavier, Veyrat-Charvillon Nicolas, How to Certify the Leakage of a Chip?, Advances in Cryptology – EUROCRYPT 2014 (2014) ISBN:9783642552199 p.459-476, 10.1007/978-3-642-55220-5_26
- Alexandre Duc, Sebastian Faust, and François-Xavier Standaert. Making masking security proofs concrete - or how to evaluate the security of any leaking device. In Elisabeth Oswald and Marc Fischlin, editors, Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26--30, 2015, Proceedings, Part I, volume 9056 of Lecture Notes in Computer Science, pages 401--429. Springer, 2015.
- Suresh Chari, Josyula R. Rao, and Pankaj Rohatgi. Template Attacks. In Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, CHES, volume 2523 of Lecture Notes in Computer Science, pages 13--28. Springer, 2002.
- Chari Suresh, Jutla Charanjit S., Rao Josyula R., Rohatgi Pankaj, Towards Sound Approaches to Counteract Power-Analysis Attacks, Advances in Cryptology — CRYPTO’ 99 (1999) ISBN:9783540663478 p.398-412, 10.1007/3-540-48405-1_26
- Brier Eric, Clavier Christophe, Olivier Francis, Correlation Power Analysis with a Leakage Model, Lecture Notes in Computer Science (2004) ISBN:9783540226666 p.16-29, 10.1007/978-3-540-28632-5_2
- Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, and C. Vikkelsoe. PRESENT: An Ultra-Lightweight Block Cipher. In Pascal Paillier and Ingrid Verbauwhede, editors, CHES, volume 4727 of Lecture Notes in Computer Science, pages 450--466. Springer, 2007.
- Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, and Vincent Rijmen. A More Efficient AES Threshold Implementation. IACR Cryptology ePrint Archive, 2013:697, 2013.
Bibliographic reference |
Moradi, Amir ; Standaert, François-Xavier. Moments-Correlating DPA.Theory of Implementations (TI 2016) (Vienna (Austria), 24/10/2016). |
Permanent URL |
http://hdl.handle.net/2078.1/181917 |