Stochastic Collision Attack

被引:12
|
作者
Bruneau, Nicolas [1 ,2 ]
Carlet, Claude [3 ,4 ]
Guilley, Sylvain [1 ,2 ]
Heuser, Annelie [5 ,6 ]
Prouff, Emmanuel [7 ]
Rioul, Olivier [2 ]
机构
[1] Secure IC SAS, Cesson Sevigne, France
[2] Univ Paris Saclay, LTCI, Telecom ParisTech, Paris, France
[3] Univ Paris VIII, LAGA, UMR 7539, CNRS, St Denis, France
[4] Univ Paris XIII, Villetaneuse, France
[5] IRISA, Rennes, France
[6] CNRS, Paris, France
[7] Grp SAFRAN, Paris, France
关键词
Side-channel analysis; collision attacks; optimal distinguisher; masking; SIDE CHANNEL-ATTACK; POWER ANALYSIS;
D O I
10.1109/TIFS.2017.2697401
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
On the one hand, collision attacks have been introduced in the context of side-channel analysis for attackers who exploit repeated code with the same data without having any knowledge of the leakage model. On the other hand, stochastic attacks have been introduced to recover leakage models of internally processed intermediate secret variables. Both techniques have shown advantages and intrinsic limitations. Most collision attacks, for instance, fail in exploiting all the leakages (e.g., only a subset of matching samples are analyzed), whereas stochastic attacks cannot involve linear regression with the full basis (while the latter basis is the most informative one). In this paper, we present an innovative attacking approach, which combines the flavors of stochastic and collision attacks. Importantly, our attack is derived from the optimal distinguisher, which maximizes the success rate when the model is known. Notably, we develop an original closed-form expression, which shows many benefits by using the full algebraic description of the leakage model. Using simulated data, we show in the unprotected case that, for low noise, the stochastic collision attack is superior to the state of the art, whereas asymptotically and thus, for higher noise, it becomes equivalent to the correlation-enhanced collision attack. Our so-called stochastic collision attack is extended to the scenario where the implementation is protected by masking. In this case, our new stochastic collision attack is more efficient in all scenarios and, remarkably, tends to the optimal distinguisher. We confirm the practicability of the stochastic collision attack thanks to experiments against a public data set (DPA contest v4). Furthermore, we derive the stochastic collision attack in case of zero-offset leakage that occurs in protected hardware implementations and use simulated data for comparison. Eventually, we underline the capability of the new distinguisher to improve its efficiency when the attack multiplicity increases.
引用
收藏
页码:2090 / 2104
页数:15
相关论文
共 50 条
  • [41] Collision probabilities in spatially stochastic media II
    Williams, M. M. R.
    ANNALS OF NUCLEAR ENERGY, 2008, 35 (06) : 1171 - 1175
  • [42] Stochastic Collision Nanoelectrochemistry: A Review of Recent Developments
    Peng, Yue-Yi
    Qian, Ruo-Can
    Hafez, Mahmoud Elsayed
    Long, Yi-Tao
    CHEMELECTROCHEM, 2017, 4 (05): : 977 - 985
  • [43] Stochastic Strategic Routing Reduces Attack Effects
    Calinescu, G.
    Kapoor, S.
    Qiao, K.
    Shin, J.
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [44] Stochastic Game Approach for Replay Attack Detection
    Miao, Fei
    Pajic, Miroslav
    Pappas, George J.
    2013 IEEE 52ND ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2013, : 1854 - 1859
  • [45] Group Verification Based Multiple-Differential Collision Attack
    Ou, Changhai
    Wang, Zhu
    Sun, Degang
    Zhou, Xinping
    Ai, Juan
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016, 2016, 9977 : 145 - 156
  • [46] Collision Attack for the Hash Function Extended MD4
    Wang, Gaoli
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 228 - 241
  • [47] Classification of disturbance vectors for collision attack in SHA-1
    Tang YuChen
    Zeng Guang
    Han WenBao
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (11) : 1 - 10
  • [48] How to Launch a Powerful Side-Channel Collision Attack?
    Long, Jiangshan
    Ou, Changhai
    Ma, Yajun
    Fan, Yifan
    Chen, Hua
    Zheng, Shihui
    IEEE TRANSACTIONS ON COMPUTERS, 2025, 74 (03) : 835 - 847
  • [49] Bitwise Collision Attack Based on Second-Order Distance
    Wang, Danhui
    Wang, An
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (03): : 1802 - 1819
  • [50] Improved Collision Attack on Hash Function MD5
    Jie Liang
    Xue-Jia Lai
    Journal of Computer Science and Technology, 2007, 22 : 79 - 87