On the Simplicity of Converting Leakages from Multivariate to Univariate
نویسندگان
چکیده
Several masking schemes to protect cryptographic implementations against side-channel attacks have been proposed. A few considered the glitches, and provided security proofs in presence of such inherent phenomena happening in logic circuits. One which is based on multi-party computation protocols and utilizes Shamir’s secret sharing scheme was presented at CHES 2011. It aims at providing security for hardware implementations – mainly of AES – against those sophisticated side-channel attacks that also take glitches into account. One part of this article deals with the practical issues and relevance of the aforementioned masking scheme. Following the recommendations given in the extended version of the mentioned article, we first provide a guideline on how to implement the scheme for the simplest settings. Constructing an exemplary design of the scheme, we provide practical side-channel evaluations based on a Virtex-5 FPGA. Our results demonstrate that the implemented scheme is indeed secure against univariate power analysis attacks given a basic measurement setup. In the second part of this paper we show how using very simple changes in the measurement setup opens the possibility to exploit multivariate leakages while still performing a univariate attack. Using these techniques the scheme under evaluation can be defeated using only a moderate number of measurements. This is applicable not only to the scheme showcased here, but also to most other known masking schemes where the shares of sensitive values are processed in adjacent clock cycles.
منابع مشابه
On the Simplicity of Converting Leakages from Multivariate to Univariate - (Case Study of a Glitch-Resistant Masking Scheme)
Several masking schemes to protect cryptographic implementations against side-channel attacks have been proposed. A few considered the glitches, and provided security proofs in presence of such inherent phenomena happening in logic circuits. One which is based on multi-party computation protocols and utilizes Shamir’s secret sharing scheme was presented at CHES 2011. It aims at providing securi...
متن کاملAssessment of Yield Stability in Common Bean Cultivars Based on Univariate and Multivariate Methods
Stability and adaptability of ten common bean cultivars were studied in water stressed and normal conditions, three planting dates (including 5 May, 20 May and 5 June), and two years (2014 and 2016) in Shahrekord, Iran. Combined analysis of variance for yield indicated that the effect of genotype by environment interaction was significant; therefore, more accurate statistical analyses were requ...
متن کاملOn the Easiness of Turning Higher-Order Leakages into First-Order
Applying random and uniform masks to the processed intermediate values of cryptographic algorithms is arguably the most common countermeasure to thwart side-channel analysis attacks. So-called masking schemes exist in various shapes but are mostly used to prevent side-channel leakages up to a certain statistical order. Thus, to learn any information about the key-involving computations a side-c...
متن کاملMultivariate and univariate analysis of genetic variation in Iranian summer savory (Satureja hortensis L.) accessions based on morphological traits
In order to evaluate the genetic variation in Iranian summer savory accessions, different accessions were analyzed using multivariate and univariate analysis. Results indicated that there were significant differences in some traits. The mean comparison analysis using least significant difference (LSD) test revealed significant differences among the accessions understudy. In this regard, the hig...
متن کاملComparing Univariate and Multivariate Indices in Drought Monitoring
In this study, drought characteristics of Arak, Bandar Anzali, Tabriz, Tehran, Rasht, Zahedan, Shiraz and Kerman stations during the statistical period of 1956 to 2015 were studied by Reconnaissance Drought Index (RDI) and Standardized Precipitation Index. Precipitation and temperature data were needed to calculate RDI. Precipitation data was also required to estimate SPI. In this study, Drinc ...
متن کامل