How to effectively decrease the resource requirement in template attack?

1Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Under the assumption that one has a reference device identical to the target device and thus be well capable of characterizing the power leakages of the target device, Template Attack (TA) is widely accepted to be the strongest power analysis attack. However, a disadvantage of TA is that, its resource requirement is usually large, i.e. in order to accurately characterize the power leakages of the target device, one usually needs to use a large number of power traces in profiling. In practice, the large resource requirement of TA hinders its application. Therefore, it is utmost important to effectively decrease the resource requirement of TA, and make it applicable in practice. In light of this, we propose Bivariate Template Attack (BTA) in this paper. The central idea of BTA is to consider the joint leakages of all interesting points in a pairwise manner. We note that, when the same interesting points are used, BTA and TA can characterize and exploit the same amount of power leakages. However, compared with TA, the resource requirement of BTA is usually small. In fact, both simulated and real experiments will verify that, compared with TA, BTA requires less power traces in profiling to reach the same key-recovery efficiency. © 2014 Springer International Publishing.

Cite

CITATION STYLE

APA

Zhang, H. (2014). How to effectively decrease the resource requirement in template attack? In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8639 LNCS, pp. 119–133). Springer Verlag. https://doi.org/10.1007/978-3-319-09843-2_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free