Choosing Distinguishers for Di erential Power Analysis Attacks

نویسندگان

  • Elisabeth Oswald
  • Luke Mather
  • Carolyn Whitnall
چکیده

Di erential power analysis attacks are among the `classical' non-invasive types of attacks against physical devices. Attacks belonging to that class are well studied in the literature, however a seemingly simple yet very important question has proven to be exceptionally di cult to answer: given a cryptographic device, how do I best choose a distinguisher to actually perform a di erential power analysis attack? This question needs to be unpicked before an attempt to an answer can be made: what is known about the power consumption characteristics of the device (everything i.e. power pro les are available, not much i.e. one can realistically assume a certain standard power model such as Hamming weight can be used, or nothing). Does the device allow control over its inputs to the cryptographic routine that is targeted? Are there any countermeasures built in, and if so which? In this article we aim to illuminate one particular aspect of such considerations. Namely, is there any best distinguisher, and consequently, can the choice of distinguisher and the modelling of the power consumption be made independently? Our approach in answering these questions is to draw from our own recent results and research into evaluation strategies for distinguishers, and linking them to other recent works. The conclusion that we can draw is that there is no generally best distinguisher, but for well de ned scenarios there are best choices for a distinguisher in conjunction with a power model.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework

The resistance of cryptographic implementations to side channel analysis is matter of considerable interest to those concerned with information security. It is particularly desirable to identify the attack methodology (e.g. di erential power analysis using correlation or distance-of-means as the distinguisher) able to produce the best results. Attempts to answer this question are complicated by...

متن کامل

Di erential Cluster Analysis ?

We propose a new technique called Di erential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions and it combines features from previously known collision attacks and Di erential Power Analysis. It captures more general leakage features and can be applied to algorithmic collisions as well as implementation speci c collisions...

متن کامل

Limited-Birthday Distinguishers for Hash Functions - Collisions beyond the Birthday Bound Can Be Meaningful

In this article, we investigate the use of limited-birthday distinguishers to the context of hash functions. We rst provide a proper understanding of the limited-birthday problem and demonstrate its soundness by using a new security notion Di erential Target Collision Resistance (dTCR) that is related to the classical Target Collision Resistance (TCR) notion. We then solve an open problem and c...

متن کامل

Performance and Security of Block Ciphers

We present a block cipher that has the best performance of all 64-bit block ciphers with the smallest proven di erential/linear probability 2 62 using the structure proposed by Matsui. One of features of his methodology is to use some power functions in GF (2 n ) with di erent n that are resistant to di erential and linear attacks. In this paper we discuss how to combine power functions x k in ...

متن کامل

An Information Theoretic Perspective on the Di erential Fault Analysis against AES

Di erential Fault Analysis (DFA) against AES has been actively studied these years. Based on similar assumptions of the fault injection, di erent DFA attacks against AES have been proposed. However, it is di cult to understand how di erent attack results are obtained for the same assumption of fault injection. It is also di cult to understand the relationship between similar assumptions of faul...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011