scispace - formally typeset
Journal ArticleDOI

Statistical Analysis of Second Order Differential Power Analysis

TLDR
It is argued that in this model, the product combining is more efficient not only than absolute difference combining, but also than all the other combining techniques proposed in the literature.
Abstract
Second order Differential Power Analysis (2O-DPA) is a powerful side-channel attack that allows an attacker to bypass the widely used masking countermeasure. To thwart 2O-DPA, higher order masking may be employed but it implies a nonnegligible overhead. In this context, there is a need to know how efficient a 2O-DPA can be, in order to evaluate the resistance of an implementation that uses first order masking and, possibly, some hardware countermeasures. Different methods of mounting a practical 2O-DPA attack have been proposed in the literature. However, it is not yet clear which of these methods is the most efficient. In this paper, we give a formal description of the higher order DPA that are mounted against software implementations. We then introduce a framework in which the attack efficiencies may be compared. The attacks we focus on involve the combining of several leakage signals and the computation of correlation coefficients to discriminate the wrong key hypotheses. In the second part of this paper, we pay particular attention to 2O-DPA that involves the product combining or the absolute difference combining. We study them under the assumption that the device leaks the Hamming weight of the processed data together with an independent Gaussian noise. After showing a way to improve the product combining, we argue that in this model, the product combining is more efficient not only than absolute difference combining, but also than all the other combining techniques proposed in the literature.

read more

Citations
More filters
Journal ArticleDOI

Introduction to differential power analysis

TL;DR: This paper examines how information leaked through power consumption and other side channels can be analyzed to extract secret keys from a wide range of devices and introduces approaches for preventing DPA attacks and for building cryptosystems that remain secure even when implemented in hardware that leaks.
Book ChapterDOI

Breaking Cryptographic Implementations Using Deep Learning Techniques

TL;DR: In this article, a recent line of research has investigated new profiling approaches mainly by applying machine learning techniques and obtained results are commensurate and in some particular cases better, compared to template attack.
Book ChapterDOI

The World is Not Enough: Another Look on Second-Order DPA

TL;DR: In this paper, an information theoretic analysis is presented for different masking schemes and target security levels, with high accuracy and smaller data complexity than previous methods, and it is shown that higher-order masking only leads to significant security improvements if the secret sharing is combined with a sufficient amount of noise.
Journal ArticleDOI

Mutual Information Analysis: a Comprehensive Study

TL;DR: Recent contributions and applications of MIA are compiled in a comprehensive study and the strengths and weaknesses of this new distinguisher are put forward and standard power analysis attacks using the correlation coefficient are compared.
Book ChapterDOI

Leakage Assessment Methodology

TL;DR: In this article, the authors present a roadmap for the evaluation labs to efficiently and correctly conduct the Welch's t-test at higher orders, and extend the test to multivariate settings, and provide details on how to efficiently carry out such a multivariate higher-order test.
References
More filters
Book ChapterDOI

Differential Power Analysis

TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Book ChapterDOI

Correlation Power Analysis with a Leakage Model

TL;DR: A classical model is used for the power consumption of cryptographic devices based on the Hamming distance of the data handled with regard to an unknown but constant reference state, which allows an optimal attack to be derived called Correlation Power Analysis.
Book

Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)

TL;DR: In this paper, the authors present a comprehensive treatment of power analysis attacks and countermeasures, based on the principle that the only way to defend against such attacks is to understand them.
Proceedings Article

Template Attacks

TL;DR: This work presents template attacks, the strongest form of side channel attack possible in an information theoretic sense, and describes in detail how an implementation of RC4, not amenable to techniques such as SPA and DPA, can be broken using template attacks with a single sample.
Book ChapterDOI

Towards Sound Approaches to Counteract Power-Analysis Attacks

TL;DR: An abstract model which approximates power consumption in most devices and in particular small single-chip devices is proposed, and a lower bound on the number of experiments required to mount statistical attacks on devices whose physical characteristics satisfy reasonable properties is proved.