Stochastic Collision Attack

被引:12
|
作者
Bruneau, Nicolas [1 ,2 ]
Carlet, Claude [3 ,4 ]
Guilley, Sylvain [1 ,2 ]
Heuser, Annelie [5 ,6 ]
Prouff, Emmanuel [7 ]
Rioul, Olivier [2 ]
机构
[1] Secure IC SAS, Cesson Sevigne, France
[2] Univ Paris Saclay, LTCI, Telecom ParisTech, Paris, France
[3] Univ Paris VIII, LAGA, UMR 7539, CNRS, St Denis, France
[4] Univ Paris XIII, Villetaneuse, France
[5] IRISA, Rennes, France
[6] CNRS, Paris, France
[7] Grp SAFRAN, Paris, France
关键词
Side-channel analysis; collision attacks; optimal distinguisher; masking; SIDE CHANNEL-ATTACK; POWER ANALYSIS;
D O I
10.1109/TIFS.2017.2697401
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
On the one hand, collision attacks have been introduced in the context of side-channel analysis for attackers who exploit repeated code with the same data without having any knowledge of the leakage model. On the other hand, stochastic attacks have been introduced to recover leakage models of internally processed intermediate secret variables. Both techniques have shown advantages and intrinsic limitations. Most collision attacks, for instance, fail in exploiting all the leakages (e.g., only a subset of matching samples are analyzed), whereas stochastic attacks cannot involve linear regression with the full basis (while the latter basis is the most informative one). In this paper, we present an innovative attacking approach, which combines the flavors of stochastic and collision attacks. Importantly, our attack is derived from the optimal distinguisher, which maximizes the success rate when the model is known. Notably, we develop an original closed-form expression, which shows many benefits by using the full algebraic description of the leakage model. Using simulated data, we show in the unprotected case that, for low noise, the stochastic collision attack is superior to the state of the art, whereas asymptotically and thus, for higher noise, it becomes equivalent to the correlation-enhanced collision attack. Our so-called stochastic collision attack is extended to the scenario where the implementation is protected by masking. In this case, our new stochastic collision attack is more efficient in all scenarios and, remarkably, tends to the optimal distinguisher. We confirm the practicability of the stochastic collision attack thanks to experiments against a public data set (DPA contest v4). Furthermore, we derive the stochastic collision attack in case of zero-offset leakage that occurs in protected hardware implementations and use simulated data for comparison. Eventually, we underline the capability of the new distinguisher to improve its efficiency when the attack multiplicity increases.
引用
收藏
页码:2090 / 2104
页数:15
相关论文
共 50 条
  • [21] Application of stochastic optimization to collision avoidance
    Burnett, R
    ISUMA 2003: FOURTH INTERNATIONAL SYMPOSIUM ON UNCERTAINTY MODELING AND ANALYSIS, 2003, : 123 - 128
  • [22] Application of stochastic optimization to collision avoidance
    Burnett, R
    PROCEEDINGS OF THE 2004 AMERICAN CONTROL CONFERENCE, VOLS 1-6, 2004, : 2789 - 2794
  • [23] A collision-attack on AES - Combining side channel- and differential-attack
    Schramm, K
    Leander, G
    Felke, P
    Paar, C
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 163 - 175
  • [24] An improved collision attack on MD5 algorithm
    Chen, Shiwei
    Jin, Chenhui
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 343 - 357
  • [25] Efficient Collision Attack Frameworks for RIPEMD-160
    Liu, Fukang
    Dobraunig, Christoph
    Mendel, Florian
    Isobe, Takanori
    Wang, Gaoli
    Cao, Zhenfu
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 : 117 - 149
  • [26] Correlation-Enhanced Power Analysis Collision Attack
    Moradi, Amir
    Mischke, Oliver
    Eisenbarth, Thomas
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 125 - +
  • [27] Differential Collision Attack on Reduced FOX Block Cipher
    Chen Jie
    Hu Yupu
    Zhang Yueyu
    Dong Xiaoli
    CHINA COMMUNICATIONS, 2012, 9 (07) : 71 - 76
  • [28] Bit-Free Collision: Application to APOP Attack
    Wang, Lei
    Sasaki, Yu
    Sakiyama, Kazuo
    Ohta, Kazuo
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 3 - 21
  • [29] Clustering Collision Power Attack on RSA-CRT
    Wan, Wunan
    Chen, Jun
    Xia, Jinyue
    Zhang, Jinquan
    Zhang, Shibin
    Chen, Hao
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 36 (02): : 417 - 434
  • [30] Collision attack and pseudorandomness of reduced-round Camellia
    Wu, WL
    Feng, DG
    Chen, H
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 252 - 266