Algebraic Side-Channel Analysis in the Presence of Errors

被引:0
|
作者
Oren, Yossef [1 ]
Kirschbaum, Mario [2 ]
Popp, Thomas [2 ]
Wool, Avishai [1 ]
机构
[1] Tel Aviv Univ, Comp & Network Secur Lab, Sch Elect Engn, IL-69978 Ramat Aviv, Israel
[2] Graz Univ Technol, Inst Appl Informat Proc & Commun, A-8010 Graz, Austria
基金
奥地利科学基金会;
关键词
Algebraic attacks; power analysis; side-channel attacks; pseudo-Boolean optimization; POWER-ANALYSIS; ATTACKS; AES;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Measurement errors make power analysis attacks difficult to mount when only a single power trace is available: the statistical methods that make DPA attacks so successful are not applicable since they require many (typically thousands) of traces. Recently it was suggested by [18] to use algebraic methods for the single-trace scenario, converting the key recovery problem into a Boolean satisfiability (SAT) problem, then using a SAT solver. However, this approach is extremely sensitive to noise (allowing an error rate of well under 1% at most), and the question of its practicality remained open. In this work we show how a single-trace side-channel analysis problem can be transformed into a pseudo-Boolean optimization (PBOPT) problem, which takes errors into consideration. The PBOPT instance can then be solved using a suitable optimization problem solver. The PBOPT syntax provides for a more expressive input specification which allows a very natural representation of measurement errors. Most importantly, we show that using our approach we are able to mount successful and efficient single-trace attacks even in the presence of realistic error rates of 10%-20%. We call our new attack methodology Tolerant Algebraic Side-Channel Analysis (TASCA). We show practical attacks on two real ciphers: Keeloq and AES.
引用
下载
收藏
页码:428 / +
页数:3
相关论文
共 50 条
  • [31] Side-Channel Analysis of PUFs and Fuzzy Extractors
    Merli, Dominik
    Schuster, Dieter
    Stumpf, Frederic
    Sigl, Georg
    TRUST AND TRUSTWORTHY COMPUTING, TRUST 2011, 2011, 6740 : 33 - 47
  • [32] Research of Hamming weight-based algebraic side-channel attack on LED
    Ji, Ke-Ke
    Wang, Tao
    Guo, Shi-Ze
    Zhao, Xin-Jie
    Liu, Hui-Ying
    Tongxin Xuebao/Journal on Communications, 2013, 34 (07): : 134 - 142
  • [33] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [34] Analysis of the algebraic side channel attack
    Carlet, Claude
    Faugere, Jean-Charles
    Goyet, Christopher
    Renault, Guenael
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (01) : 45 - 62
  • [35] Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
    Renauld, Mathieu
    Standaert, Francois-Xavier
    Veyrat-Charvillon, Nicolas
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS, 2009, 5747 : 97 - 111
  • [36] A Novel Profiled Side-Channel Attack in Presence of High Algorithmic Noise
    Taha, Mostafa
    Schaumont, Patrick
    2012 IEEE 30TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2012, : 433 - 438
  • [37] Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
    Bronchain, Olivier
    Hendrickx, Julien M.
    Massart, Clement
    Olshevsky, Alex
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1, 2019, 11692 : 713 - 737
  • [38] NeuroSCA: Evolving Activation Functions for Side-Channel Analysis
    Knezevic, Karlo
    Fulir, Juraj
    Jakobovic, Domagoj
    Picek, Stjepan
    Durasevic, Marko
    IEEE ACCESS, 2023, 11 : 284 - 299
  • [39] Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation
    Kasper, Timo
    Oswald, David
    Paar, Christof
    RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 61 - 77
  • [40] Profiled Side-Channel Analysis in the Efficient Attacker Framework
    Picek, Stjepan
    Heuser, Annelie
    Perin, Guilherme
    Guilley, Sylvain
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2021), 2022, 13173 : 44 - 63