International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Improved Blind Side-Channel Analysis by Exploitation of Joint Distributions of Leakages

Authors:
Christophe Clavier
Léo Reynaud
Download:
DOI: 10.1007/978-3-319-66787-4_2
Search ePrint
Search Google
Conference: CHES 2017
Abstract: Classical side-channel analysis include statistical attacks which require the knowledge of either the plaintext or the ciphertext to predict some internal value to be correlated to the observed leakages.In this paper we revisit a blind (i.e. leakage-only) attack from Linge et al. that exploits joint distributions of leakages. We show – both by simulations and concrete experiments on a real device – that the maximum likelihood (ML) approach is more efficient than Linge’s distance-based comparison of distributions, and demonstrate that this method can be easily adapted to deal with implementations protected by first-order Boolean masking. We give example applications of different variants of this approach, and propose countermeasures that could prevent them.Interestingly, we also observe that, when the inputs are known, the ML criterion is more efficient than correlation power analysis.
BibTeX
@inproceedings{ches-2017-28927,
  title={Improved Blind Side-Channel Analysis by Exploitation of Joint Distributions of Leakages},
  booktitle={Cryptographic Hardware and Embedded Systems – CHES 2017},
  series={Lecture Notes in Computer Science},
  publisher={Springer},
  volume={10529},
  pages={24-44},
  doi={10.1007/978-3-319-66787-4_2},
  author={Christophe Clavier and Léo Reynaud},
  year=2017
}