Evaluation and improvement of generic-emulating dpa attacks

9Citations
Citations of this article
31Readers
Mendeley users who have this article in their library.
Get full text

Abstract

At CT-RSA 2014, Whitnall, Oswald and Standaert gave the impossibility result that no generic DPA strategies (i. e., without any a priori knowledge about the leakage characteristics) can recover secret information from a physical device by considering an injective target function (e. g., AES and PRESENT S-boxes), and as a remedy, they proposed a slightly relaxed strategy “generic-emulating DPAs” free from the non-injectivity constraint. However, as we show in this paper, the only generic-emulating DPA proposed in their work, namely the SLR-based DPA, suffers from two drawbacks: unstable outcomes in the high-noise regime (i. e., for a small number of traces) and poor performance especially on real smart cards (compared with traditional DPAs with a specific power model). In order to solve these problems, we introduce two new generic-emulating distinguishers, based on lasso and ridge regression strategies respectively, with more stable and better performances than the SLR-based one. Further, we introduce the cross-validation technique that improves the generic-emulating DPAs in general and might be of independent interest. Finally, we compare the performances of all aforementioned generic-emulating distinguishers (both with and without cross-validation) in simulated leakages functions of different degrees, and on an AES ASIC implementation. Our experimental results show that our generic-emulating distinguishers are stable and some of them behave even better than (resp., almost the same as) the best Difference-of-Means distinguishers in simulated leakages (resp., on a real implementation), and thus make themselves good alternatives to traditional DPAs.

Cite

CITATION STYLE

APA

Wang, W., Yu, Y., Liu, J., Guo, Z., Standaert, F. X., Gu, D., … Fu, R. (2015). Evaluation and improvement of generic-emulating dpa attacks. In Lecture Notes in Computer Science (Vol. 9293, pp. 416–432). Springer Verlag. https://doi.org/10.1007/978-3-662-48324-4_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free