Side channel attacks on cryptographic devices as a classification problem
نویسندگان
چکیده
In this contribution we examine three data reduction techniques in the context of Template Attacks. The Template Attack is a powerful two-step side channel attack which models an almost omnipotent adversary in the profiling step, but restricts him to a single observation in the classification step. The profiling step requires data reduction due to computational complexity and vast amounts of data. Here we examine the inter class variance, the Spearman correlation coefficient, and principal component analysis. The classification step requires a distinguisher, which we implemented by linear discriminant analysis. Our results lead to the conclusion that PCA in combination with LDA gives the highest classification accuracies on unseen data from the tried linear classifier methods.
منابع مشابه
How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA
Side channel and fault attacks take advantage from the fact that the behavior of crypto implementations can be observed and provide hints that simplify revealing keys. These attacks use identical devices either for preparation of attacks or for measurements. By the preparation of attacks the structure and the electrical circuit of devices, that are identical to the target, is analyzed. By side ...
متن کاملIndividualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks
Side channel and fault attacks take advantage from the fact that the behavior of crypto implementations can be observed and provides hints that simplify revealing keys. In a real word a lot of devices, that are identical to the target device, can be attacked before attacking the real target to increase the success of the attack. Their package can be opened and their electromagnetic radiation an...
متن کاملProposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis
Side channel and fault attacks take advantage from the fact that the behavior of crypto implementations can be observed and provide hints that simplify revealing keys. These attacks are normally prepared by analyzing devices that are identical to the real target. Here we propose to individualize the design of cryptographic devices in order to prevent attacks that use identical devices. We imple...
متن کاملPartition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices
Given a cryptographic device leaking side-channel information, different distinguishers can be considered to turn this information into a successful key recovery. Such proposals include e.g. Kocher’s original DPA, correlation and template attacks. A natural question is therefore to determine the most efficient approach. In the last years, various experiments have confirmed the effectiveness of ...
متن کاملIntroducing FOBOS: Flexible Open-source BOard for Side-channel analysis
Side-channel analysis attacks pose a growing threat to implementations of cryptographic algorithms implemented in software as well as in hardware. Current standard side-channel evaluation boards with Field Programmable Gate Arrays (FPGAs), that allow for exploring the vulnerability of cryptographic implementations on FPGAs, are expensive and available only for a few FPGA devices. Furthermore, a...
متن کاملA Study on Side Channel Cryptanalysis in Elliptic Curve Cryptosystems
Mobile devices such as smartcards are penetrating in our daily life in order for us to be comfortable. When cryptographic schemes are implemented on computers such as smartcards, side channel attacks are particular menaces to them. Since electric power is provided from the outside of them, the attacker can observe the power consumption while they perform cryptographic operations. In side channe...
متن کامل