How many interesting points should be used in a template attack?

被引:9
|
作者
Zhang, Hailong [1 ]
Zhou, Yongbin [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Minzhuang Rd 89-A, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
Side channel attacks; Power analysis attacks; Template attack; Interesting points; Profiling efficiency; CORRELATION POWER ANALYSIS; CHANNEL; LEAKAGE;
D O I
10.1016/j.jss.2016.07.028
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Considering that one can fully characterize and exploit the power leakages of the reference device in the process of recovering the secret key used by the target device, template attack (TA) is broadly accepted as the strongest power analysis attack from the perspective of information theory. In order to fully exploit the power leakages of the reference device, one usually has to concern the power leakages at different interesting points. Then, a natural question is how many interesting points should be used in a TA? We note that the number of interesting points one uses directly decides the profiling efficiency of TA. In light of this, we evaluate the optimal number of interesting points in simulated scenarios, and the evaluation results bring us an empirically useful formula. Then, in order to validate the empirical formula, we perform TA using power traces provided by DPA Contest v4.1. In the real scenario, the correlation method is used to select the interesting points, and the S-Box output of the 1st round AES encryption is chosen as the target intermediate value. Evaluation results show that the empirical formula is indeed correct and can be useful in practice. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:105 / 113
页数:9
相关论文
共 50 条
  • [1] How to Choose Interesting Points for Template Attacks More Effectively?
    Fan, Guangjun
    Zhou, Yongbin
    Zhang, Hailong
    Feng, Dengguo
    [J]. TRUSTED SYSTEMS, INTRUST 2014, 2015, 9473 : 168 - 183
  • [2] How Many Total Points Should Your Course Have?
    Troisi, Jordan D.
    Arnott-Hill, Elizabeth
    Benson, Or'Shaundra
    Wright, Julian W. C.
    Fleck, Bethany
    [J]. TEACHING OF PSYCHOLOGY, 2023, 50 (01) : 47 - 56
  • [3] How many genes should be used in multigene phylogenetic trees?
    Huang, V. C. H.
    Hsiang, T.
    Moreno-Hagelsieb, G.
    [J]. CANADIAN JOURNAL OF PLANT PATHOLOGY, 2013, 35 (01) : 114 - 114
  • [4] How Many Points Should Be Awarded for Interactive Textbook Reading Assignments?
    Edgcomb, Alex
    Vahid, Frank
    [J]. FRONTIERS IN EDUCATION CONFERENCE (FIE), 2015, 2015, : 2004 - 2007
  • [5] Corneal surface characterization: how many Zernike terms should be used?
    Iskander, R
    Collins, M
    Davis, B
    Franklin, R
    [J]. INVESTIGATIVE OPHTHALMOLOGY & VISUAL SCIENCE, 2001, 42 (04) : S896 - S896
  • [6] How should biometrics be used and how should it absolutely not be used?
    Pfitzmann, Andreas
    [J]. Informatik-Spektrum, 2006, 29 (05) : 353 - 356
  • [7] Bach's singers (how many singers should be used for a Bach cantata)
    Altschuler, E
    [J]. EARLY MUSIC, 2003, 31 (02) : 318 - 318
  • [8] How many alleles per locus should be used to estimate genetic distances?
    S T Kalinowski
    [J]. Heredity, 2002, 88 : 62 - 65
  • [9] How many alleles per locus should be used to estimate genetic distances?
    Kalinowski, ST
    [J]. HEREDITY, 2002, 88 (1) : 62 - 65
  • [10] How many points is this worth?
    Huhn, C
    [J]. EDUCATIONAL LEADERSHIP, 2005, 63 (03) : 81 - 82