Side channel attacks on cryptographic devices as a classification problem

نویسندگان

  • Peter Karsmakers
  • Benedikt Gierlichs
  • Kristiaan Pelckmans
  • Katrien De Cock
  • Johan Suykens
  • Bart Preneel
  • Bart De Moor
  • K. H. Kempen
چکیده

In this contribution we examine three data reduction techniques in the context of Template Attacks. The Template Attack is a powerful two-step side channel attack which models an almost omnipotent adversary in the profiling step, but restricts him to a single observation in the classification step. The profiling step requires data reduction due to computational complexity and vast amounts of data. Here we examine the inter class variance, the Spearman correlation coefficient, and principal component analysis. The classification step requires a distinguisher, which we implemented by linear discriminant analysis. Our results lead to the conclusion that PCA in combination with LDA gives the highest classification accuracies on unseen data from the tried linear classifier methods.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA

Side channel and fault attacks take advantage from the fact that the behavior of crypto implementations can be observed and provide hints that simplify revealing keys. These attacks use identical devices either for preparation of attacks or for measurements. By the preparation of attacks the structure and the electrical circuit of devices, that are identical to the target, is analyzed. By side ...

متن کامل

Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks

Side channel and fault attacks take advantage from the fact that the behavior of crypto implementations can be observed and provides hints that simplify revealing keys. In a real word a lot of devices, that are identical to the target device, can be attacked before attacking the real target to increase the success of the attack. Their package can be opened and their electromagnetic radiation an...

متن کامل

Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis

Side channel and fault attacks take advantage from the fact that the behavior of crypto implementations can be observed and provide hints that simplify revealing keys. These attacks are normally prepared by analyzing devices that are identical to the real target. Here we propose to individualize the design of cryptographic devices in order to prevent attacks that use identical devices. We imple...

متن کامل

Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices

Given a cryptographic device leaking side-channel information, different distinguishers can be considered to turn this information into a successful key recovery. Such proposals include e.g. Kocher’s original DPA, correlation and template attacks. A natural question is therefore to determine the most efficient approach. In the last years, various experiments have confirmed the effectiveness of ...

متن کامل

Introducing FOBOS: Flexible Open-source BOard for Side-channel analysis

Side-channel analysis attacks pose a growing threat to implementations of cryptographic algorithms implemented in software as well as in hardware. Current standard side-channel evaluation boards with Field Programmable Gate Arrays (FPGAs), that allow for exploring the vulnerability of cryptographic implementations on FPGAs, are expensive and available only for a few FPGA devices. Furthermore, a...

متن کامل

A Study on Side Channel Cryptanalysis in Elliptic Curve Cryptosystems

Mobile devices such as smartcards are penetrating in our daily life in order for us to be comfortable. When cryptographic schemes are implemented on computers such as smartcards, side channel attacks are particular menaces to them. Since electric power is provided from the outside of them, the attacker can observe the power consumption while they perform cryptographic operations. In side channe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007