TU Darmstadt / ULB / TUbiblio

How to Compare Profiled Side-Channel Attacks

Standaert, François-Xavier ; Koeune, Francois ; Schindler, Werner
Hrsg.: Abdalla, Michel ; Pointcheval, David ; Fouque, Pierre-Alain ; Vergnaud, Damien (2009)
How to Compare Profiled Side-Channel Attacks.
7th International Conference on Applied Cryptography and Network Security. Paris, France (02.-05.06.2009)
doi: 10.1007/978-3-642-01957-9_30
Konferenzveröffentlichung, Bibliographie

Kurzbeschreibung (Abstract)

Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this scenario, an adversary first uses a device under his control in order to build a good leakage model. Then, he takes advantage of this leakage model to exploit the actual leakages of a similar target device and perform a key recovery. Since such attacks are divided in two phases (namely profiling and online attack), the question of how to best evaluate those two phases arises. In this paper, we take advantage of a recently introduced framework for the analysis of side-channel attacks to tackle this issue. We show that the quality of a proling phase is nicely captured by an information theoretic metric. By contrast, the effectiveness of the online key recovery phase is better measured with a security metric. As an illustration, we use this methodology to compare the two main techniques for profiled side-channel attacks, namely template attacks and stochastic models. Our results confirm the higher profiling efficiency of stochastic models when reasonable assumptions can be made about the leakages of a device.

Typ des Eintrags: Konferenzveröffentlichung
Erschienen: 2009
Herausgeber: Abdalla, Michel ; Pointcheval, David ; Fouque, Pierre-Alain ; Vergnaud, Damien
Autor(en): Standaert, François-Xavier ; Koeune, Francois ; Schindler, Werner
Art des Eintrags: Bibliographie
Titel: How to Compare Profiled Side-Channel Attacks
Sprache: Englisch
Publikationsjahr: Juni 2009
Verlag: Springer
Titel der Zeitschrift, Zeitung oder Schriftenreihe: Applied Cryptography and Network Security, ACNS 2009
Buchtitel: Applied cryptography and network security
Reihe: Lecture Notes in Computer Science
Band einer Reihe: 5536
Veranstaltungstitel: 7th International Conference on Applied Cryptography and Network Security
Veranstaltungsort: Paris, France
Veranstaltungsdatum: 02.-05.06.2009
DOI: 10.1007/978-3-642-01957-9_30
Kurzbeschreibung (Abstract):

Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this scenario, an adversary first uses a device under his control in order to build a good leakage model. Then, he takes advantage of this leakage model to exploit the actual leakages of a similar target device and perform a key recovery. Since such attacks are divided in two phases (namely profiling and online attack), the question of how to best evaluate those two phases arises. In this paper, we take advantage of a recently introduced framework for the analysis of side-channel attacks to tackle this issue. We show that the quality of a proling phase is nicely captured by an information theoretic metric. By contrast, the effectiveness of the online key recovery phase is better measured with a security metric. As an illustration, we use this methodology to compare the two main techniques for profiled side-channel attacks, namely template attacks and stochastic models. Our results confirm the higher profiling efficiency of stochastic models when reasonable assumptions can be made about the leakages of a device.

Freie Schlagworte: Secure Things
ID-Nummer: TUD-CS-2009-0094
Fachbereich(e)/-gebiet(e): LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
Hinterlegungsdatum: 30 Dez 2016 20:23
Letzte Änderung: 24 Nov 2022 09:30
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen