On the Easiness of Turning Higher-Order Leakages into First-Order
نویسندگان
چکیده
Applying random and uniform masks to the processed intermediate values of cryptographic algorithms is arguably the most common countermeasure to thwart side-channel analysis attacks. So-called masking schemes exist in various shapes but are mostly used to prevent side-channel leakages up to a certain statistical order. Thus, to learn any information about the key-involving computations a side-channel adversary has to estimate the higher-order statistical moments of the leakage distributions. However, the complexity of this approach increases exponentially with the statistical order to be estimated and the precision of the estimation suffers from an enormous sensitivity to the noise level. In this work we present an alternative procedure to exploit higher-order leakages which captivates by its simplicity and effectiveness. Our approach, which focuses on (but is not limited to) univariate leakages of hardware masking schemes, is based on categorizing the power traces according to the distribution of leakage points. In particular, at each sample point an individual subset of traces is considered to mount ordinary firstorder attacks. We present the theoretical concept of our approach based on simulation traces and examine its efficiency on noisy real-world measurements taken from a first-order secure threshold implementation of the block cipher PRESENT-80, implemented on a 150nm CMOS ASIC prototype chip. Our analyses verify that the proposed technique is indeed a worthy alternative to conventional higher-order attacks and suggest that it might be able to relax the sensitivity of higher-order evaluations to the noise level.
منابع مشابه
Assessment of Hiding the Higher-Order Leakages in Hardware - What Are the Achievements Versus Overheads?
Higher-order side-channel attacks are becoming amongst the major interests of academia as well as industry sector. It is indeed being motivated by the development of countermeasures which can prevent the leakages up to certain orders. As a concrete example, threshold implementation (TI) as an efficient way to realize Boolean masking in hardware is able to avoid first-order leakages. Trivially, ...
متن کاملOn the Infinite Product Representation of Solution and Dual Equation of Sturm-Liouville Equation with Turning Point of Order 4m+1
متن کامل
The effect of first order magnetic field in a GaAs/AlAs spherical quantum dot with hydrogenic impurity
In this research, the effect of the first order magnetic field on the ground-state of a centered hydrogenic donor impurity in a GaAs/AlAs spherical quantum dot has been calculated. The perturbation method has been used within the framework of effective mass approximation for these calculations. Overall, the analysis shows that a proper choice of quantum dot radius and magnetic field can signifi...
متن کاملThe effect of first order magnetic field in a GaAs/AlAs spherical quantum dot with hydrogenic impurity
In this research, the effect of the first order magnetic field on the ground-state of a centered hydrogenic donor impurity in a GaAs/AlAs spherical quantum dot has been calculated. The perturbation method has been used within the framework of effective mass approximation for these calculations. Overall, the analysis shows that a proper choice of quantum dot radius and magnetic field can signifi...
متن کاملNumerical method for a system of second order singularly perturbed turning point problems
In this paper, a parameter uniform numerical method based on Shishkin mesh is suggested to solve a system of second order singularly perturbed differential equations with a turning point exhibiting boundary layers. It is assumed that both equations have a turning point at the same point. An appropriate piecewise uniform mesh is considered and a classical finite difference scheme is applied on t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2017 شماره
صفحات -
تاریخ انتشار 2017