How to Estimate the Success Rate of Higher-Order Side-Channel Attacks

نویسندگان

  • Victor Lomné
  • Emmanuel Prouff
  • Matthieu Rivain
  • Thomas Roche
  • Adrian Thillard
چکیده

The resistance of a cryptographic implementation with regards to side-channel analysis is often quantified by measuring the success rate of a given attack. This approach cannot always be followed in practice, especially when the implementation includes some countermeasures that may render the attack too costly for an evaluation purpose, but not costly enough from a security point of view. An evaluator then faces the issue of estimating the success rate of an attack he cannot mount. The present paper addresses this issue by presenting a methodology to estimate the success rate of higherorder side-channel attacks targeting implementations protected by masking. Specifically, we generalize the approach initially proposed at SAC 2008 in the context of first-order side-channel attacks. The principle is to approximate the distribution of an attack’s score vector by a multivariate Gaussian distribution, whose parameters are derived by profiling the leakage. One can then accurately compute the expected attack success rate with respect to the number of leakage measurements. We apply this methodology to higher-order side-channel attacks based on the widely used correlation and likelihood distinguishers. Moreover, we validate our approach with simulations and practical attack experiments against masked AES implementations running on two different microcontrollers.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Key to Success - Success Exponents for Side-Channel Distinguishers

The success rate is the classical metric for evaluating the performance of side-channel attacks. It is generally computed empirically from measurements for a particular device or using simulations. Closedform expressions of success rate are desirable because they provide an explicit functional dependence on relevant parameters such as number of measurements and signal-to-noise ratio which help ...

متن کامل

Assessing the likelihood of a road accident following a sudden disability

Abstract Background: One of the major challenges in road safety is the occurrence of sudden disability attacks while driving. An important point about the occupational health of drivers who have patients who have the potential for sudden disability attacks is to estimate the likelihood and consequences of the attacks. In other words, how likely is an accident to follow a sudden disability while...

متن کامل

Improved Channel Estimation for DVB-T2 Systems by Utilizing Side Information on OFDM Sparse Channel Estimation

The second generation of digital video broadcasting (DVB-T2) standard utilizes orthogonal frequency division multiplexing (OFDM) system to reduce and to compensate the channel effects by utilizing its estimation. Since wireless channels are inherently sparse, it is possible to utilize sparse representation (SR) methods to estimate the channel. In addition to sparsity feature of the channel, the...

متن کامل

Using Side Channel Attacks in the Human Computational Model

Recent works have looked at how to use human knowledge or computability in order to define or to achieve security. We take this approach one step further, and suggest to use cryptanalytic attacks in the human computational model. We have identified several instances where side channel attacks on human beings may be useful. We show for each of these cases the appropriate use of side channel atta...

متن کامل

High-Order Attacks Against the Exponent Splitting Protection

Exponent splitting is a classical technique to protect modular exponentiation against side-channel attacks. Although it is rarely implemented due to efficiency reasons, it is widely considered as a highlysecure solution. Therefore it is often used as a reference to benchmark new countermeasure proposals. In this paper, we make new observations about the statistical behavior of the splitting of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2014  شماره 

صفحات  -

تاریخ انتشار 2014