Towards Leakage Exploitation Optimality in Profiled Side-Channel Attacks
نویسندگان
چکیده
Template Attack is widely accepted to be one of the most powerful side-channel attacks, because it is usually assumed that one has a full knowledge of targeted crypto devices and thus be well capable of characterizing the side-channel leakages. However, the question of whether Template Attack is really optimal in terms of leakage exploitation rate is still unclear. In this paper, we present a negative answer to this crucial question, by introducing a normalization process into classical Template Attack. On the theoretical side, we prove that our normalized Template Attack is (strictly) better in terms of leakage exploitation rate than classical Template Attack; on the practical side, we evaluate the key-recovery efficiency of normalized Template Attack and its classical counterpart as well under identical scenarios, by performing attacks against both simulated and real power traces. Our experimental results show that the proposed method is valid end effective. Interestingly enough, this normalization is of extremely low computation cost, and thus is very easy-to-use in practice. Therefore, we argue that this normalization should be integrated into profiled attacks as one necessary step in the future, so that one could better understand the practical threats of them.
منابع مشابه
Adaptive Chosen-Message Side-Channel Attacks
Most side-channel attacks that have been published in the open literature assume knownor chosen-message adversarial scenarios. In this paper, we analyze the increase of the attacks’ efficiencies that can be obtained by adaptively selecting the messages. For this purpose, we first describe a generic strategy that allows an adversary to take advantage of this capability. We show that it can be ap...
متن کاملHow to Further Increase Leakage Exploitation Rate in Profiled Side-Channel Attacks?
Template Attack is widely accepted to be one of the most powerful side-channel attacks, because it is assumed that one has full knowledge of targeted crypto devices and thus be well capable of characterizing the side-channel leakages. However, whether or not Template Attack exploits side-channel leakages to the fullest is still not clear. In this paper, we present a negative answer to this cent...
متن کاملHow to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this scenario, an adversary first uses a device under his control in order to build a good leakage model. Then, he takes advantage of this leakage model to exploit the actual leakages of a similar target device and perform ...
متن کاملTowards optimal leakage exploitation rate in template attacks
Under the assumption that one has a reference device identical or similar to the target device, and thus be well capable of characterizing power leakages of the target device, Template Attacks are widely accepted to be the most powerful side-channel attacks. However, the question of whether Template Attacks are really optimal in terms of the leakage exploitation rate is still unclear. In this p...
متن کاملA Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers
Formally bounding side-channel leakage is important to bridge the gap between the theory and practice in cryptography. However, bounding side-channel leakages is difficult because leakage in a cryptosystem could be from several sources. Moreover the amount of leakage from a source may vary depending on the implementation of the cipher and the form of attack. To formally analyze the security of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2013 شماره
صفحات -
تاریخ انتشار 2013