Cryptology ePrint Archive: Report 2013/608
Towards Leakage Exploitation Rate Optimality in Template Attack
Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng
Abstract: Template Attack is widely accepted to be one of the most powerful side-channel attacks, because it is usually assumed that one has a full knowledge of the targeted crypto devices and thus be well capable of characterizing the side-channel leakages. However, the question of whether Template Attack is really optimal in terms of leakage exploitation rate is still unclear. In this paper, we present a negative answer to this crucial question, by introducing a normalization process into classical Template Attack. On the theoretical side, we prove that our Normalized Template Attack is (strictly) better in terms of leakage exploitation rate than the classical Template Attack; on the practical side, we evaluate the key-recovery efficiency of Normalized Template Attack and its classical counterpart as well under identical scenarios, by performing attacks against both simulated and real power traces. Our experimental results show that the proposed method is valid and effective. Interestingly enough, this normalization process is of extremely low computation cost, and thus is very easy-to-use in practice. Therefore, we argue that this normalization process should be integrated into Template Attack as one necessary step in the future, so that one could better understand the practical threats of Template Attack.
Category / Keywords: Information Security, Side-Channel Attacks, Power Analysis Attack, Template Attack, leakage exploitation rate, normalization process.
Date: received 19 Sep 2013, last revised 8 Dec 2013
Contact author: guangjunfan at 163 com
Available format(s): PDF | BibTeX Citation
Version: 20131209:021546 (All versions of this report)
Short URL: ia.cr/2013/608
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]