A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks

被引:0
|
作者
Oren, Yossef [1 ]
Weisse, Ofir [2 ]
Wool, Avishai [3 ]
机构
[1] Columbia Univ, Network Secur Lab, New York, NY 10027 USA
[2] Tel Aviv Univ, Sch Comp Sci, Tel Aviv, Israel
[3] Tel Aviv Univ, Sch Elect Engn, Tel Aviv, Israel
关键词
Constraint solvers; power analysis; template attacks; EXPERTS; AES;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The use of constraint solvers, such as SAT-or Pseudo-Boolean-solvers, allows the extraction of the secret key from one or two side-channel traces. However, to use such a solver the cipher must be represented at bit-level. For byte-oriented ciphers this produces very large and unwieldy instances, leading to unpredictable, and often very long, run times. In this paper we describe a specialized byte-oriented constraint solver for side channel cryptanalysis. The user only needs to supply code snippets for the native operations of the cipher, arranged in a flow graph that models the dependence between the side channel leaks. Our framework uses a soft decision mechanism which overcomes realistic measurement noise and decoder classification errors, through a novel method for reconciling multiple probability distributions. On the DPA v4 contest dataset our framework is able to extract the correct key from one or two power traces in under 9 seconds with a success rate of over 79%.
引用
收藏
页码:17 / 34
页数:18
相关论文
共 50 条
  • [41] Determining the direction of causal influence in large probabilistic networks: a constraint-based approach
    Badea, L
    ECAI 2004: 16TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2004, 110 : 263 - 267
  • [42] A new constructive approach to constraint-based geometric design
    Podgorelec, D
    COMPUTER-AIDED DESIGN, 2002, 34 (11) : 769 - 785
  • [43] Constraint-based path selection for new SLA acceptance
    Krile, S
    SYMPOTIC'03: JOINT IST WORKSHOP ON MOBILE FUTURE & SYMPOSIUM ON TRENDS IN COMMUNICATIONS, PROCEEDINGS, 2003, : 67 - 70
  • [44] A New Countermeasure against Scan-Based Side-Channel Attacks
    Luo, Yanhui
    Cui, Aijiao
    Qu, Gang
    Li, Huawei
    2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, : 1722 - 1725
  • [45] New Approaches of Side-Channel Attacks Based on Chip Testing Methods
    Meschkov, Sergej
    Gnad, Dennis R. E.
    Krautter, Jonas
    Tahoori, Mehdi B.
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 42 (05) : 1411 - 1424
  • [46] Representation constraint-based dual-channel network for face antispoofing
    Li, Zuhe
    Cui, Yuhao
    Wang, Fengqin
    Liu, Weihua
    Yang, Yongshuang
    Yu, Zeqi
    Jiang, Bin
    Chen, Hui
    IET COMPUTER VISION, 2024, 18 (02) : 289 - 303
  • [47] A general constraint-based programming framework for multi-robot applications
    Fiore, Mario D.
    Allmendinger, Felix
    Natale, Ciro
    Robotics and Computer-Integrated Manufacturing, 86
  • [48] CMAP: a Flexible and Efficient Framework for Constraint-based Mining of Activity Patterns
    Wang, Changzhou
    Choi, Jai
    Kao, Anne
    Tjoelker, Rod
    FUSION: 2009 12TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION, VOLS 1-4, 2009, : 1451 - 1458
  • [49] A Framework for Fluid Motion Estimation using a Constraint-Based Refinement Approach
    Doshi H.
    Nori U.K.
    Machine Graphics and Vision, 2023, 32 (3-4): : 17 - 43
  • [50] A general constraint-based programming framework for multi-robot applications
    Fiore, Mario D.
    Allmendinger, Felix
    Natale, Ciro
    ROBOTICS AND COMPUTER-INTEGRATED MANUFACTURING, 2024, 86