Algebraic Side-Channel Analysis in the Presence of Errors

被引:0
|
作者
Oren, Yossef [1 ]
Kirschbaum, Mario [2 ]
Popp, Thomas [2 ]
Wool, Avishai [1 ]
机构
[1] Tel Aviv Univ, Comp & Network Secur Lab, Sch Elect Engn, IL-69978 Ramat Aviv, Israel
[2] Graz Univ Technol, Inst Appl Informat Proc & Commun, A-8010 Graz, Austria
基金
奥地利科学基金会;
关键词
Algebraic attacks; power analysis; side-channel attacks; pseudo-Boolean optimization; POWER-ANALYSIS; ATTACKS; AES;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Measurement errors make power analysis attacks difficult to mount when only a single power trace is available: the statistical methods that make DPA attacks so successful are not applicable since they require many (typically thousands) of traces. Recently it was suggested by [18] to use algebraic methods for the single-trace scenario, converting the key recovery problem into a Boolean satisfiability (SAT) problem, then using a SAT solver. However, this approach is extremely sensitive to noise (allowing an error rate of well under 1% at most), and the question of its practicality remained open. In this work we show how a single-trace side-channel analysis problem can be transformed into a pseudo-Boolean optimization (PBOPT) problem, which takes errors into consideration. The PBOPT instance can then be solved using a suitable optimization problem solver. The PBOPT syntax provides for a more expressive input specification which allows a very natural representation of measurement errors. Most importantly, we show that using our approach we are able to mount successful and efficient single-trace attacks even in the presence of realistic error rates of 10%-20%. We call our new attack methodology Tolerant Algebraic Side-Channel Analysis (TASCA). We show practical attacks on two real ciphers: Keeloq and AES.
引用
下载
收藏
页码:428 / +
页数:3
相关论文
共 50 条
  • [41] CDAE: Towards Empowering Denoising in Side-Channel Analysis
    Yang, Guang
    Li, Huizhong
    Ming, Jingdian
    Zhou, Yongbin
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 269 - 286
  • [42] Hydraulic analysis of side-channel spillways as reservoir outlets
    Etheridge, M.J.
    Journal of the Chartered Institution of Water and Environment Management, 1996, 10 (04): : 245 - 252
  • [43] Side-Channel Analysis of Montgomery's Representation Randomization
    Jaulmes, Eliane
    Prouff, Emmanuel
    Wild, Justine
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2014, 2014, 8781 : 212 - 227
  • [44] Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation
    Kasper, Timo
    Oswald, David
    Paar, Christof
    RFID SECURITY AND PRIVACY, 2012, 7055 : 61 - 77
  • [45] Machine learning in side-channel analysis: a first study
    Hospodar, Gabriel
    Gierlichs, Benedikt
    De Mulder, Elke
    Verbauwhede, Ingrid
    Vandewalle, Joos
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (04) : 293 - 302
  • [46] Performance Analysis of Multilayer Perceptron in Profiling Side-Channel Analysis
    Weissbart, Leo
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 198 - 216
  • [47] On the Performance of Convolutional Neural Networks for Side-Channel Analysis
    Picek, Stjepan
    Samiotis, Ioannis Petros
    Kim, Jaehun
    Heuser, Annelie
    Bhasin, Shivam
    Legay, Axel
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2018, 2018, 11348 : 157 - 176
  • [48] When Failure Analysis Meets Side-Channel Attacks
    Di-Battista, Jerome
    Courrege, Jean-Christophe
    Rouzeyre, Bruno
    Torres, Lionel
    Perdu, Philippe
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 188 - +
  • [49] The hydraulic analysis of side-channel spillways as reservoir outlets
    Etheridge, MJ
    JOURNAL OF THE CHARTERED INSTITUTION OF WATER AND ENVIRONMENTAL MANAGEMENT, 1996, 10 (04): : 245 - 252
  • [50] A comprehensive study of deep learning for side-channel analysis
    Masure L.
    Dumas C.
    Prouff E.
    2020, Ruhr-University of Bochum (2020): : 348 - 375