The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.08 - Aug. (2013 vol.62)
pp: 1629-1640
Guillaume Dabosville , Oberthur Technologies, Nanterre
Emmanuel Prouff , National Agency for Information Systems Security (ANSSI), Paris
ABSTRACT
Since the preliminary works of Kocher et al. in the nineties, studying and enforcing the resistance of cryptographic implementations against side channel analysis (SCA) is became a dynamic and prolific area of embedded security. Stochastic attacks, introduced by Schindler et al., form one of the main families of SCA and they offer a valuable alternative to template attacks which are known to be among the most efficient ones. However, stochastic attacks, as long as template attacks, have been initially designed for adversaries with a perfect copy of the target device in hand. Such a prerequisite makes them a pertinent tool when studying the implementations resistance against the most powerful adversaries, but it limits their pertinence as a cryptanalytic technique. Indeed, getting open access to a copy of the device under attack is difficult in practice and, even when possible, it remains difficult to exploit templates acquired on one device to attack another one. In light of this observation, several papers have been published to adapt stochastic attacks for contexts where the above prerequisite is no longer needed. They succeeded in defining practical attacks against unprotected implementations but no work was published until now to explain how stochastic attacks can be applied against secure implementations. In this paper, we deal with this issue. We first extend the previous analyses of stochastic attacks to highlight their core foundations. Then, we explain how they can be generalized to defeat first-order masking techniques, which are the main SCA countermeasures. Eventually, we illustrate the interest of the new attack by a series of experiments on simulated and real curves.
INDEX TERMS
Linear regression, Context, Cryptography, Random variables, Vectors, Probability density function, Polynomials, higher order differential power analysis, Embedded systems security, cryptographic implementations, side channel analysis
CITATION
Guillaume Dabosville, Emmanuel Prouff, "A New Second-Order Side Channel Attack Based on Linear Regression", IEEE Transactions on Computers, vol.62, no. 8, pp. 1629-1640, Aug. 2013, doi:10.1109/TC.2012.112
REFERENCES
[1] S. Chari, J. Rao, and P. Rohatgi, "Template Attacks," Proc. Conf. Cryptographic Hardware and Embedded Systems (CHES '02), B. Kaliski Jr., Ç. Koç, and C. Paar, eds., pp. 13-29, 2002.
[2] W. Schindler, K. Lemke, and C. Paar, "A Stochastic Model for Differential Side Channel Cryptanalysis," Pro. Conf. Cryptographic Hardware and Embedded Systems (CHES '05), J. Rao and B. Sunar, eds., 2005.
[3] C. Archambeau, E. Peeters, F.-X. Standaert, and J.-J. Quisquater, "Template Attacks in Principal Subspaces," Proc. Conf. Cryptographic Hardware and Embedded Systems (CHES '06), L. Goubin and M. Matsui, eds., pp. 1-14, 2006.
[4] P. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis," Proc. 19th Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '99), M. Wiener, ed., pp. 388-397, 1999.
[5] E. Brier, C. Clavier, and F. Olivier, "Correlation Power Analysis with a Leakage Model," Proc. Sixth Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '04), M. Joye and J.-J. Quisquater, eds., pp. 16-29, 2004.
[6] R. Bévan and E. Knudsen, "Ways to Enhance Power Analysis," Proc. Fifth Int'l Conf. Information Security and Cryptology (ICISC '02), P. Lee and C. Lim, eds., pp. 327-342, 2002.
[7] B. Gierlichs, L. Batina, P. Tuyls, and B. Preneel, "Mutual Information Analysis," Proc. Workshop Cryptographic Hardware and Embedded Systems (CHES), E. Oswald and P. Rohatgi, eds., pp. 426-442, 2008.
[8] T. Messerges, "Using Second-Order Power Analysis to Attack DPA Resistant Software," Proc. Second Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '00), Ç. Koç and C. Paar, eds., pp. 238-251, 2000.
[9] G. Blakely, "Safeguarding Cryptographic Keys," Proc. Nat'l Computer Conf., vol. 48, pp. 313-317, June 1979.
[10] A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.
[11] B. Gierlichs, L. Batina, B. Preneel, and I. Verbauwhede, "Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis," Cryptology ePrint Archive, Report 2009/228, http:/eprint.iacr.org/, 2009.
[12] E. Prouff and M. Rivain, "Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis," Proc. Seventh Int'l Conf. Applied Cryptography and Network Security (ANCS '09), M. Abdalla, D. Pointcheval, P.-A. Fouque, and D. Vergnaud, eds., pp. 499-518, 2009.
[13] F.-X. Standaert, N. Veyrat-Charvillon, E. Oswald, B. Gierlichs, M. Medwed, M. Kasper, and S. Mangard, "The World Is Not Enough: Another Look on Second-Order DPA," Proc. Int'l Conf. Theory Application of Cryptology and Information Security (ASIACRYPT), M. Abe, ed., pp. 112-129, 2010.
[14] G. Fumaroli, A. Martinelli, E. Prouff, and M. Rivain, "Affine Masking against Higher-Order Side Channel Analysis," Proc. 17th Int'l Conf. Selected Areas in Cryptography, A. Biryukov, G. Gong, and D. R. Stinson, eds., pp. 262-280, 2010.
[15] E. Prouff and M. Rivain, "Theoretical and Practical Aspects of Mutual Information-Based Side Channel Analysis," Int'l J. Applied Cryptography, vol. 2, no. 2, pp. 121-138, 2010.
[16] J. Doget, E. Prouff, M. Rivain, and F.-X. Standaert, "Univariate Side Channel Attacks and Leakage Modeling," J. Cryptographic Eng., vol. 1, no. 2, pp. 123-144, 2011.
[17] K. Lemke-Rust and C. Paar, "Gaussian Mixture Models for Higher-Order Side Channel Analysis," Proc. Ninth Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '07), P. Paillier and I. Verbauwhede, eds., pp. 14-27, 2007.
[18] W. Schindler, "Advanced Stochastic Methods in Side Channel Analysis on Block Ciphers in the Presence of Masking," J. Math. Cryptology, vol. 2, pp. 291-310, 2008.
[19] S. Chari, C. Jutla, J. Rao, and P. Rohatgi, "Towards Sound Approaches to Counteract Power-Analysis Attacks," Proc. 19th Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '99), M. Wiener, ed., pp. 398-412, 1999.
[20] L. Goubin and J. Patarin, "DES and Differential Power Analysis - The Duplication Method," Proc. First Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '99), Ç. Koç and C. Paar, eds., pp. 158-172, 1999.
[21] J.-S. Coron and L. Goubin, "On Boolean and Arithmetic Masking against Differential Power Analysis," Proc. Second Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '00), Ç,. Koç and C. Paar, eds., pp. 231-237, 2000.
[22] B. Everitt, The Cambridge Dictionary of Statistics. Cambridge Univ. Press, 1998.
[23] C. Carlet, "Boolean Functions for Cryptography and Error Correcting Codes," Boolean Methods and Models, pp. 257-397, Cambridge Univ. Press, 2010.
[24] B. Gierlichs, K. Lemke-Rust, and C. Paar, "Templates vs. Stochastic Methods," Proc. Eighth Int'l Conf. Cryptographic Hardware and Embedded Systems (CHES '06), L. Goubin and M. Matsui, eds., pp. 15-29, 2006.
[25] E. Oswald and S. Mangard, "Template Attacks on Masking—Resistance Is Futile," Proc. Seventh Cryptographers' Track at the RSA Conf. Topics in Cryptology (CT-RSA '07), M. Abe, ed., pp. 243-256, 2007.
[26] J. Patel and C. Read, Handbook of the Normal Distribution, series Statistics, Textbooks and Monographs. Marcel Dekker, http://books.google.combooks?id=zoVLF0VF9UYC , 1996.
[27] A.R. Runnalls, "Kullback-Leibler Approach to Gaussian Mixture Reduction," IEEE Trans. Aerospace and Electronic Systems, vol. 43, no. 3, pp. 989-999, http://www.cs.kent.ac.uk/pubs/20072797, July 2007.
[28] L. Batina, B. Gierlichs, E. Prouff, M. Rivain, F.-X. Standaert, and N. Veyrat-Charvillon, "Mutual Information Analysis: A Comprehensive Study," J. Cryptology, vol. 24, no. 2, pp. 269-291, Apr. 2011.
[29] C. Whitnall and E. Oswald, "A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework," Proc. 31st Ann. Cryptology Conf. Advances in Cryptology (CRYPTO), P. Rogaway, ed., pp. 316-334, 2011.
[30] C. Whitnall, E. Oswald, and L. Mather, "An Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual Information Analysis," Proc. 10th IFIP WG 8.8/11.2 Int'l Conf. Smart Card Research and Advanced Applications (CARDIS), V. Rijmen and E. Prouff, eds., pp. 316-334, 2011.
[31] E. Prouff, M. Rivain, and R. Bévan, "Statistical Analysis of Second Order Differential Power Analysis," IEEE Trans. Computers, vol. 58, no. 6, pp. 799-811, June 2009.
[32] J. Waddle and D. Wagner, "Toward Efficient Second-order Power Analysis," Proc. Sixth Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '04), M. Joye and J.-J. Quisquater, eds., pp. 1-15, 2004.
[33] Proc. Conf. Cryptographic Hardware and Embedded Systems (CHES '06), L. Goubin and M. Matsui, eds, 2006.
[34] Proc. Conf. Cryptographic Hardware and Embedded Systems (CHES '04), M. Joye and J.-J. Quisquater, eds. 2004.
[35] Proc. Conf. Advances in Cryptology (CRYPTO '99), M. Wiener, ed., 1999.
[36] Proc. Cryptographic Hardware and Embedded Systems (CHES '00), Ç. Koç, C. Paar, eds., 2000.
39 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool