A fair experimental evaluation of distance correlation side-channel distinguisher

被引:0
|
作者
Socha, Petr [1 ]
Miskovsky, Vojtech [1 ]
Novotny, Martin [1 ]
机构
[1] Czech Tech Univ, Fac Informat Technol, Prague, Czech Republic
关键词
Side-Channel Analysis; Embedded Security; Internet of Things; Correlation Power Analysis; Non-linear Correlation; DPA;
D O I
10.1109/MECO55406.2022.9797142
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Side-channel attacks pose a severe threat to cryptographic implementations, allowing the attacker to recover secret information based on physical observations of the cryptographic device. Correlation Power Analysis is considered to be one of the most powerful attacks in the non-profiled scenario. In this paper, we consider the distance/Brownian correlation instead of the traditionally used Pearson coefficient. We give a fair comparison of our novel approach attacking AES on three different FPGA platforms and we discuss the distance correlation potential in the context of side-channel analysis.
引用
收藏
页码:110 / 113
页数:4
相关论文
共 50 条
  • [21] Key Update Countermeasure for Correlation-Based Side-Channel Attacks
    Yutian Gui
    Suyash Mohan Tamore
    Ali Shuja Siddiqui
    Fareena Saqib
    [J]. Journal of Hardware and Systems Security, 2020, 4 (3) : 167 - 179
  • [22] Fast Side-Channel Security Evaluation of ECC Implementations Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder
    Azouaoui, Melissa
    Poussier, Romain
    Standaert, Francois-Xavier
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 25 - 42
  • [23] Side-channel attack pitfalls
    Tiri, Kris
    [J]. 2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, : 15 - 20
  • [24] Blind Side-Channel SIFA
    Azouaoui, Melissa
    Papagiannopoulos, Kosias
    Zuerner, Dominik
    [J]. PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), 2021, : 555 - 560
  • [25] The EM side-channel(s)
    Agrawal, D
    Archambeault, B
    Rao, JR
    Rohatgi, P
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2002, 2002, 2523 : 29 - 45
  • [26] Reactive side-channel countermeasures: Applicability and quantitative security evaluation
    Agosta, Giovanni
    Barenghi, Alessandro
    Pelosi, Gerardo
    Scandale, Michele
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2018, 62 : 50 - 60
  • [27] An Evaluation of Power Side-Channel Resistance for RNS Secure Logic
    Selvam, Ravikumar
    Tyagi, Akhilesh
    [J]. SENSORS, 2022, 22 (06)
  • [28] On the Evaluation of Deep Learning-Based Side-Channel Analysis
    Wu, Lichao
    Perin, Guilherme
    Picek, Stjepan
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2022, 2022, 13211 : 49 - 71
  • [29] Quantitative Evaluation of Side-channel Security for Elliptic Curve Cryptosystems
    Li, Huiyun
    Chen, Tingding
    Wu, Keke
    Yu, Fengqi
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 163 - 166
  • [30] Side-Channel Aware Fuzzing
    Sperl, Philip
    Boettinger, Konstantin
    [J]. COMPUTER SECURITY - ESORICS 2019, PT I, 2019, 11735 : 259 - 278