Stochastic Collision Attack

被引:12
|
作者
Bruneau, Nicolas [1 ,2 ]
Carlet, Claude [3 ,4 ]
Guilley, Sylvain [1 ,2 ]
Heuser, Annelie [5 ,6 ]
Prouff, Emmanuel [7 ]
Rioul, Olivier [2 ]
机构
[1] Secure IC SAS, Cesson Sevigne, France
[2] Univ Paris Saclay, LTCI, Telecom ParisTech, Paris, France
[3] Univ Paris VIII, LAGA, UMR 7539, CNRS, St Denis, France
[4] Univ Paris XIII, Villetaneuse, France
[5] IRISA, Rennes, France
[6] CNRS, Paris, France
[7] Grp SAFRAN, Paris, France
关键词
Side-channel analysis; collision attacks; optimal distinguisher; masking; SIDE CHANNEL-ATTACK; POWER ANALYSIS;
D O I
10.1109/TIFS.2017.2697401
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
On the one hand, collision attacks have been introduced in the context of side-channel analysis for attackers who exploit repeated code with the same data without having any knowledge of the leakage model. On the other hand, stochastic attacks have been introduced to recover leakage models of internally processed intermediate secret variables. Both techniques have shown advantages and intrinsic limitations. Most collision attacks, for instance, fail in exploiting all the leakages (e.g., only a subset of matching samples are analyzed), whereas stochastic attacks cannot involve linear regression with the full basis (while the latter basis is the most informative one). In this paper, we present an innovative attacking approach, which combines the flavors of stochastic and collision attacks. Importantly, our attack is derived from the optimal distinguisher, which maximizes the success rate when the model is known. Notably, we develop an original closed-form expression, which shows many benefits by using the full algebraic description of the leakage model. Using simulated data, we show in the unprotected case that, for low noise, the stochastic collision attack is superior to the state of the art, whereas asymptotically and thus, for higher noise, it becomes equivalent to the correlation-enhanced collision attack. Our so-called stochastic collision attack is extended to the scenario where the implementation is protected by masking. In this case, our new stochastic collision attack is more efficient in all scenarios and, remarkably, tends to the optimal distinguisher. We confirm the practicability of the stochastic collision attack thanks to experiments against a public data set (DPA contest v4). Furthermore, we derive the stochastic collision attack in case of zero-offset leakage that occurs in protected hardware implementations and use simulated data for comparison. Eventually, we underline the capability of the new distinguisher to improve its efficiency when the attack multiplicity increases.
引用
收藏
页码:2090 / 2104
页数:15
相关论文
共 50 条
  • [1] Collision Attack on Boole
    Mendel, Florian
    Nad, Tomislav
    Schlaeffer, Martin
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 369 - 381
  • [2] Collision Attack on Grindahl
    Peyrin, Thomas
    JOURNAL OF CRYPTOLOGY, 2015, 28 (04) : 879 - 898
  • [3] Group Collision Attack
    Ou, Changhai
    Wang, Zhu
    Sun, Degang
    Zhou, Xinping
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (04) : 939 - 953
  • [4] Collision Attack on Grindahl
    Thomas Peyrin
    Journal of Cryptology, 2015, 28 : 879 - 898
  • [5] Restricted near collision attack on Plantlet
    Kumar, Satyam
    Mondal, Sandip Kumar
    Sarkar, Santanu
    Isobe, Takanori
    Baksi, Anubhab
    Adhikari, Avishek
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2024, 14 (01) : 19 - 34
  • [6] Restricted near collision attack on Plantlet
    Satyam Kumar
    Sandip Kumar Mondal
    Santanu Sarkar
    Takanori Isobe
    Anubhab Baksi
    Avishek Adhikari
    Journal of Cryptographic Engineering, 2024, 14 : 19 - 34
  • [7] Collision Attack on 5 Rounds of Grostl
    Mendel, Florian
    Rijmen, Vincent
    Schlaeffer, Martin
    FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 : 509 - 521
  • [8] Instruction-Fetching Attack and Practice in Collision Fault Attack on AES
    Jiang, Huilong
    Zhu, Xiang
    Han, Jianwei
    SYMMETRY-BASEL, 2022, 14 (10):
  • [9] Collision attack on XTR and a countermeasure with a fixed pattern
    Han, DG
    Takagi, T
    Kim, TH
    Kim, HW
    Chung, KI
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 864 - 873
  • [10] Generative Collision Attack on Deep Image Hashing
    Ying, Luyang
    Xiong, Cheng
    Qin, Chuan
    Luo, Xiangyang
    Qian, Zhenxing
    Zhang, Xinpeng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 2748 - 2762