The Community for Technology Leaders
Green Image
Issue No. 08 - Aug. (2013 vol. 62)
ISSN: 0018-9340
pp: 1629-1640
Guillaume Dabosville , Oberthur Technologies, Nanterre
Emmanuel Prouff , National Agency for Information Systems Security (ANSSI), Paris
Since the preliminary works of Kocher et al. in the nineties, studying and enforcing the resistance of cryptographic implementations against side channel analysis (SCA) is became a dynamic and prolific area of embedded security. Stochastic attacks, introduced by Schindler et al., form one of the main families of SCA and they offer a valuable alternative to template attacks which are known to be among the most efficient ones. However, stochastic attacks, as long as template attacks, have been initially designed for adversaries with a perfect copy of the target device in hand. Such a prerequisite makes them a pertinent tool when studying the implementations resistance against the most powerful adversaries, but it limits their pertinence as a cryptanalytic technique. Indeed, getting open access to a copy of the device under attack is difficult in practice and, even when possible, it remains difficult to exploit templates acquired on one device to attack another one. In light of this observation, several papers have been published to adapt stochastic attacks for contexts where the above prerequisite is no longer needed. They succeeded in defining practical attacks against unprotected implementations but no work was published until now to explain how stochastic attacks can be applied against secure implementations. In this paper, we deal with this issue. We first extend the previous analyses of stochastic attacks to highlight their core foundations. Then, we explain how they can be generalized to defeat first-order masking techniques, which are the main SCA countermeasures. Eventually, we illustrate the interest of the new attack by a series of experiments on simulated and real curves.
Linear regression, Context, Cryptography, Random variables, Vectors, Probability density function, Polynomials, higher order differential power analysis, Embedded systems security, cryptographic implementations, side channel analysis

E. Prouff and G. Dabosville, "A New Second-Order Side Channel Attack Based on Linear Regression," in IEEE Transactions on Computers, vol. 62, no. , pp. 1629-1640, 2013.
170 ms
(Ver 3.3 (11022016))