Abstract
Power analysis attacks have received a great deal of attention, because they can be carried out easily than conventional cryptanalysis. Profiling attacks are one of the most efficient attacks among power analysis attacks. However, profiling attacks have the limitation of using the same experimental environment for both the profiling and attacking phases. If two sets of power traces are obtained from different setups, then the attack may not be feasible. We propose a new method to overcome this limitation with different measurement environments using multivariate regression analysis. Our results show that the proposed method can successfully retrieve a secret key using two different types of power traces. Moreover, the success rate is higher than for non-profiling attacks, i.e., Correlation Power Analysis (CPA).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
We do not represent DPA Workstation is better than Inspector SCA. Because the SNR can be very varied depends on target device, environmental settings, etc. Therefore, SNR of traces from Inspector SCA can be higher in some case.
References
Standaert, F.-X., Gierlichs, B., Verbauwhede, I.: Partition vs. comparison side-channel distinguishers: an empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected CMOS devices. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 253–267. Springer, Heidelberg (2009)
Chari, S., Rao, J., Rohatgi, P.: Template attacks. In: International Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 13–28 (2002)
Schindler, W., Lemke, K., Paar, C.: A stochastic model for differential side channel cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 30–46. Springer, Heidelberg (2005)
Sugawara, T., Homma, N., Aoki, T., Satoh, A.: Profiling attack using multivariate regression analysis. IEICE Electron. Expr. 7, 1139–1144 (2010)
Standaert, F.-X., Archambeau, C.: Using subspace-based template attacks to compare and combine power and electromagnetic information leakages. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 411–425. Springer, Heidelberg (2008)
Archambeau, C., Peeters, E., Standaert, F.-X., Quisquater, J.-J.: Template attacks in principal subspaces. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 1–14. Springer, Heidelberg (2006)
Rechberger, C., Oswald, E.: Practical template attacks. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol. 3325, pp. 440–456. Springer, Heidelberg (2005)
Kim, Y., Homma, N., Aoki, T., Choi, H.: Security evaluation of cryptographic modules against profiling attacks. In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. LNCS, vol. 7839, pp. 383–394. Springer, Heidelberg (2013)
Gierlichs, B., Lemke-Rust, K., Paar, C.: Templates vs. stochastic methods. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 15–29. Springer, Heidelberg (2006)
Abdelaziz, E.M., Sylvain, G.: Portability of templates. J. Cryptographic Eng. 2, 63–74 (2012)
Choudary, O., Kuhn, M.G.: Template attacks on different devices. In: Prouff, E. (ed.) COSADE 2014. LNCS, vol. 8622, pp. 179–198. Springer, Heidelberg (2014)
Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004)
Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual information analysis: a generic side-channel distinguisher. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 426–442. Springer, Heidelberg (2008)
Cryptographic Research, DPA Workstation. http://www.cryptography.com/technology/dpa-workstation.html
Riscure, Inspector SCA. https://www.riscure.com/security-tools/inspector-sca/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Kim, Y. (2015). Successful Profiling Attacks with Different Measurement Environments for Each Phase. In: Rhee, KH., Yi, J. (eds) Information Security Applications. WISA 2014. Lecture Notes in Computer Science(), vol 8909. Springer, Cham. https://doi.org/10.1007/978-3-319-15087-1_25
Download citation
DOI: https://doi.org/10.1007/978-3-319-15087-1_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-15086-4
Online ISBN: 978-3-319-15087-1
eBook Packages: Computer ScienceComputer Science (R0)