DocumentCode
16045
Title
A New Second-Order Side Channel Attack Based on Linear Regression
Author
Dabosville, G. ; Doget, J. ; Prouff, E.
Author_Institution
Soc. Oberthur Technol., Colombes, France
Volume
62
Issue
8
fYear
2013
fDate
Aug. 2013
Firstpage
1629
Lastpage
1640
Abstract
Since the preliminary works of Kocher et al. in the nineties, studying and enforcing the resistance of cryptographic implementations against side channel analysis (SCA) is became a dynamic and prolific area of embedded security. Stochastic attacks, introduced by Schindler et al., form one of the main families of SCA and they offer a valuable alternative to template attacks which are known to be among the most efficient ones. However, stochastic attacks, as long as template attacks, have been initially designed for adversaries with a perfect copy of the target device in hand. Such a prerequisite makes them a pertinent tool when studying the implementations resistance against the most powerful adversaries, but it limits their pertinence as a cryptanalytic technique. Indeed, getting open access to a copy of the device under attack is difficult in practice and, even when possible, it remains difficult to exploit templates acquired on one device to attack another one. In light of this observation, several papers have been published to adapt stochastic attacks for contexts where the above prerequisite is no longer needed. They succeeded in defining practical attacks against unprotected implementations but no work was published until now to explain how stochastic attacks can be applied against secure implementations. In this paper, we deal with this issue. We first extend the previous analyses of stochastic attacks to highlight their core foundations. Then, we explain how they can be generalized to defeat first-order masking techniques, which are the main SCA countermeasures. Eventually, we illustrate the interest of the new attack by a series of experiments on simulated and real curves.
Keywords
cryptography; embedded systems; regression analysis; stochastic processes; SCA; cryptanalytic technique; cryptographic implementations; embedded system security; first-order masking technique; linear regression; second-order side channel attack; side channel analysis; stochastic attacks; template attacks; Context; Cryptography; Linear regression; Polynomials; Probability density function; Random variables; Vectors; Embedded systems security; cryptographic implementations; higher order differential power analysis; side channel analysis;
fLanguage
English
Journal_Title
Computers, IEEE Transactions on
Publisher
ieee
ISSN
0018-9340
Type
jour
DOI
10.1109/TC.2012.112
Filename
6212441
Link To Document