Entropy-based Power Attack

Abstract : Recent works have shown that the mutual information is a generic side-channel distinguisher, since it detects any kind of statistical dependency between leakage observations and hypotheses on the secret. In this study the mutual information analysis (MIA) is tested in a noisy real world design. It indeed appears to be a powerful approach to break unprotected implementations. However, we observe that the MIA fails when applied on a DES cryptoprocessor with masked substitution boxes (Sboxes) in ROM. Nevertheless, this masking implementation remains sensitive to Higher-Order Differential Power Analysis (HO-DPA). For instance, an attack based on a variance analysis clearly shows the vulnerabilities of a first order masking countermeasure. We propose a novel approach to information-theoretic HO attacks, called the Entropy-based Power Analysis (EPA). This new attack gives a greatest importance to highly informative partitions and in the meantime better distinguishes between the key hypotheses. A thorough empirical evaluation of the proposed attack confirms the overwhelming advantage of this new approach when compared with MIA.
Document type :
Conference papers
IEEE. Hardware-Oriented Security and Trust, Jun 2010, Anaheim, CA, United States. IEEE, pp.1-6, 2010, Computer Society. <10.1109/HST.2010.5513124>


https://hal.archives-ouvertes.fr/hal-00618482
Contributor : Sylvain Guilley <>
Submitted on : Wednesday, March 14, 2012 - 1:13:06 AM
Last modification on : Wednesday, March 14, 2012 - 9:48:22 AM

File

mutual_info_revised.pdf
fileSource_public_author

Identifiers

Collections

Citation

Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament. Entropy-based Power Attack. IEEE. Hardware-Oriented Security and Trust, Jun 2010, Anaheim, CA, United States. IEEE, pp.1-6, 2010, Computer Society. <10.1109/HST.2010.5513124>. <hal-00618482v2>

Export

Share

Metrics

Consultation de
la notice

73

Téléchargement du document

46