Generic DPA Attacks: Curse or Blessing?
نویسندگان
چکیده
Generic DPA attacks, such as MIA, have been recently proposed as a method to mount DPA attacks without the need for possibly restrictive assumptions on the leakage behaviour. Previous work identified some shortcomings of generic DPA attacks when attacking injective targets (such as the AES Sbox output). In this paper, we focus on that particular property of generic DPA attacks and explain limitations, workarounds and advantages. Firstly we show that the original fix to address this issue (consisting of dropping bits on predictions to destroy the injectivity) works in practice. Secondly, we describe how a determined attacker can circumvent the issue of attacking injective targets and mount a generic attack on the AES using previously mentioned noninjective targets. Thirdly, we explain important and attractive properties of generic attacks, such as being effective under any leakage behaviour. Consequently, we are able to recover keys even if the attacker only observes an encrypted version of the leakage, for instance when a device is using bus encryption with a constant key. The same property also allows to mount attacks on later rounds of the AES with a reduced number of key hypotheses compared to classical DPA. All main observations are supported by experimental results, when possible on real measurements.
منابع مشابه
O-17: Female Genital Mutilation: A Curse or Blessing among Women of Reproductive Age in Nigeria
Background: Female genital mutilation (FGM) practice is mostly carried out by traditional circumcisers, who often play other central roles in communities, such as attending childbirths. Increasingly, FGM is also performed by health care providers. However, FGM is recognized internationally as a violation of the human rights of girls and women. The study investigates a broad cross-cultural study...
متن کاملA Generic Protection against High-Order Differential Power Analysis
Di erential Power Analysis (DPA) on smart-cards was introduced by Paul Kocher [11] in 1998. Since, many countermeasures have been introduced to protect cryptographic algorithms from DPA attacks. Unfortunately these features are known not to be e cient against high order DPA (even of second order). In these paper we will rst describe new specialized rst order attack and remind how are working hi...
متن کاملGeneric Side-Channel Countermeasures for Reconfigurable Devices
In this work, we propose and evaluate generic hardware countermeasures against DPA attacks for recent FPGA devices. The proposed set of FPGA-specific countermeasures can be combined to resist a large variety of first-order DPA attacks, even with 100 million recorded power traces. This set includes generic and resource-efficient countermeasures for on-chip noise generation, random-data processin...
متن کاملNatural Resources, Institutions Quality, and Economic Growth; A Cross-Country Analysis
Abstract[1] Natural resources as a source of wealth can increase prosperity or impede economic growth. Empirical studies with different specifications and data are also mixed on whether natural resources are curse or blessing. In fact, the variety of model specifications, measurements, and samples in the empirical literature makes it difficult to generalize the results. In this study, a growth...
متن کاملEvaluation and Improvement of Generic-Emulating DPA Attacks
At CT-RSA 2014, Whitnall, Oswald and Standaert gave the impossibility result that no generic DPA strategies (i.e., without any a priori knowledge about the leakage characteristics) can recover secret information from a physical device by considering an injective target function (e.g., AES and PRESENT S-boxes), and as a remedy, they proposed a slightly relaxed strategy “generic-emulating DPAs” f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014