Entropy-based Power Attack - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2010

Entropy-based Power Attack

Houssem Maghrebi
  • Fonction : Auteur
  • PersonId : 865259
Sylvain Guilley
Jean-Luc Danger
Florent Flament
  • Fonction : Auteur
  • PersonId : 849414

Résumé

Recent works have shown that the mutual information is a generic side-channel distinguisher, since it detects any kind of statistical dependency between leakage observations and hypotheses on the secret. In this study the mutual information analysis (MIA) is tested in a noisy real world design. It indeed appears to be a powerful approach to break unprotected implementations. However, we observe that the MIA fails when applied on a DES cryptoprocessor with masked substitution boxes (Sboxes) in ROM. Nevertheless, this masking implementation remains sensitive to Higher-Order Differential Power Analysis (HO-DPA). For instance, an attack based on a variance analysis clearly shows the vulnerabilities of a first order masking countermeasure. We propose a novel approach to information-theoretic HO attacks, called the Entropy-based Power Analysis (EPA). This new attack gives a greatest importance to highly informative partitions and in the meantime better distinguishes between the key hypotheses. A thorough empirical evaluation of the proposed attack confirms the overwhelming advantage of this new approach when compared with MIA.
Fichier principal
Vignette du fichier
mutual_info_revised.pdf (182.19 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-00618482 , version 1 (02-09-2011)
hal-00618482 , version 2 (14-03-2012)

Identifiants

Citer

Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament. Entropy-based Power Attack. Hardware-Oriented Security and Trust, Jun 2010, Anaheim, CA, United States. pp.1-6, ⟨10.1109/HST.2010.5513124⟩. ⟨hal-00618482v2⟩
142 Consultations
372 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More