A new difference method for side-channel analysis with high-dimensional leakage models

22Citations
Citations of this article
29Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The goal of the DPA contest v2 (2009 - 2010) was to find the most efficient side-channel attack against a particular unprotected AES-128 hardware implementation. In this paper we discuss two problems of general importance that affect the success rate of profiling based attacks, and we provide effective solutions. First, we consider the impact of temperature variations on the power consumption, which causes a so-called drifting offset. To cope with this problem we introduce a new method called Offset Tolerant Method (OTM) and adjust OTM to the stochastic approach (SA-OTM). The second important issue of this paper concerns the choice of an appropriate leakage model as this determines the success rate of SA and SA-OTM. Experiments with high-dimensional leakage models show that the overall leakage is not only caused by independent transitions of bit lines. Compared to the formely best submitted attack of the DPA contest v2 the combination of SA-OTM with high-dimensional leakage models reduces the required number of power traces to 50%. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Heuser, A., Kasper, M., Schindler, W., & Stöttinger, M. (2012). A new difference method for side-channel analysis with high-dimensional leakage models. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7178 LNCS, pp. 365–382). https://doi.org/10.1007/978-3-642-27954-6_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free