Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A New Second-Order Side Channel Attack Based on Linear Regression

Published: 01 August 2013 Publication History

Abstract

Since the preliminary works of Kocher et al. in the nineties, studying and enforcing the resistance of cryptographic implementations against side channel analysis (SCA) is became a dynamic and prolific area of embedded security. Stochastic attacks, introduced by Schindler et al., form one of the main families of SCA and they offer a valuable alternative to template attacks which are known to be among the most efficient ones. However, stochastic attacks, as long as template attacks, have been initially designed for adversaries with a perfect copy of the target device in hand. Such a prerequisite makes them a pertinent tool when studying the implementations resistance against the most powerful adversaries, but it limits their pertinence as a cryptanalytic technique. Indeed, getting open access to a copy of the device under attack is difficult in practice and, even when possible, it remains difficult to exploit templates acquired on one device to attack another one. In light of this observation, several papers have been published to adapt stochastic attacks for contexts where the above prerequisite is no longer needed. They succeeded in defining practical attacks against unprotected implementations but no work was published until now to explain how stochastic attacks can be applied against secure implementations. In this paper, we deal with this issue. We first extend the previous analyses of stochastic attacks to highlight their core foundations. Then, we explain how they can be generalized to defeat first-order masking techniques, which are the main SCA countermeasures. Eventually, we illustrate the interest of the new attack by a series of experiments on simulated and real curves.

Cited By

View all
  • (2023)The EVIL Machine: Encode, Visualize and Interpret the LeakageProceedings of the 38th ACM/SIGAPP Symposium on Applied Computing10.1145/3555776.3577688(1566-1575)Online publication date: 27-Mar-2023
  • (2021)Integrated Power Signature Generation Circuit for IoT Abnormality DetectionACM Journal on Emerging Technologies in Computing Systems10.1145/346047618:1(1-13)Online publication date: 29-Sep-2021
  • (2020)Side-Channel Leakage Amount Estimation Based on Communication Theory2019 IEEE Global Communications Conference (GLOBECOM)10.1109/GLOBECOM38437.2019.9013493(1-6)Online publication date: 17-Jun-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Transactions on Computers
IEEE Transactions on Computers  Volume 62, Issue 8
August 2013
206 pages

Publisher

IEEE Computer Society

United States

Publication History

Published: 01 August 2013

Author Tags

  1. Embedded systems security
  2. cryptographic implementations
  3. higher order differential power analysis
  4. side channel analysis

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)The EVIL Machine: Encode, Visualize and Interpret the LeakageProceedings of the 38th ACM/SIGAPP Symposium on Applied Computing10.1145/3555776.3577688(1566-1575)Online publication date: 27-Mar-2023
  • (2021)Integrated Power Signature Generation Circuit for IoT Abnormality DetectionACM Journal on Emerging Technologies in Computing Systems10.1145/346047618:1(1-13)Online publication date: 29-Sep-2021
  • (2020)Side-Channel Leakage Amount Estimation Based on Communication Theory2019 IEEE Global Communications Conference (GLOBECOM)10.1109/GLOBECOM38437.2019.9013493(1-6)Online publication date: 17-Jun-2020
  • (2020)On the Implementation Efficiency of Linear Regression-Based Side-Channel AttacksConstructive Side-Channel Analysis and Secure Design10.1007/978-3-030-68773-1_8(147-172)Online publication date: 1-Apr-2020
  • (2018)Ridge-Based DPAIEEE Transactions on Information Forensics and Security10.5555/3196160.319624413:5(1301-1316)Online publication date: 1-May-2018
  • (2018)Analysis of Software Implemented Low Entropy Masking SchemesSecurity and Communication Networks10.1155/2018/72068352018(16)Online publication date: 1-Mar-2018
  • (2017)RFASecurity and Communication Networks10.1155/2017/50986262017Online publication date: 1-Jan-2017
  • (2017)Stochastic Collision AttackIEEE Transactions on Information Forensics and Security10.1109/TIFS.2017.269740112:9(2090-2104)Online publication date: 1-Sep-2017
  • (2014)A Statistical Model for Higher Order DPA on Masked DevicesProceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems --- CHES 2014 - Volume 873110.1007/978-3-662-44709-3_9(147-169)Online publication date: 23-Sep-2014
  • (2013)Behind the Scene of Side Channel AttacksPart I of the Proceedings of the 19th International Conference on Advances in Cryptology - ASIACRYPT 2013 - Volume 826910.1007/978-3-642-42033-7_26(506-525)Online publication date: 1-Dec-2013
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media