Cryptology ePrint Archive: Report 2011/505
A New Second Order Side Channel Attack Based on Linear Regression
Julien Doget and Guillaume Dabosville and Emmanuel Prouff
Abstract: Embedded implementations of cryptographic primitives need protection against Side Channel Analysis. Stochastic attacks, introduced by Schindler et al. at CHES 2005, are an example of such an analysis. They offer a pertinent alternative to template attacks which efficiency is optimal, and they can theoretically defeat any kind of countermeasure including masking. In both template and stochastic attacks, the adversary needs to be able to carry out a profiling stage on a perfect copy of the target device. This makes them interesting tools to study the resistance of implementations against such a powerful adversary, but it limits their pertinency in practice. It is indeed difficult to have an open access to a copy of the device under attack and, even when it is possible, it remains difficult to exploit templates acquired on one device to attack another one.
In this paper, we propose a new attack technique which shares many similarities with stochastic attacks but does not require any profiling stage. As a consequence, no copy of the device is needed anymore. We conduct an in-depth analysis of this new attack to highlight its core foundations. Then, we apply it to widely used masking schemes and we illustrate its interest by a series of experiments on simulated and real curves.
Category / Keywords: applications / Side-Channel, Stochastic, Masking, Second-Order, Linear Regression
Date: received 15 Sep 2011, last revised 21 Dec 2011
Contact author: julien doget at gmail com
Available format(s): PDF | BibTeX Citation
Version: 20111221:161252 (All versions of this report)
Short URL: ia.cr/2011/505
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]