Cryptology ePrint Archive: Report 2013/794

Behind the Scene of Side Channel Attacks

Victor Lomn\'{e}, Emmanuel Prouff, and Thomas Roche

Abstract: Since the introduction of side channel attacks in the nineties, a large amount of work has been devoted to their effectiveness and efficiency improvements. On the one side, general results and conclusions are drawn in theoretical frameworks, but the latter ones are often set in a too ideal context to capture the full complexity of an attack performed in real conditions. On the other side, practical improvements are proposed for specific contexts but the big picture is often put aside, which makes them difficult to adapt to different contexts. This paper tries to bridge the gap between both worlds. We specifically investigate which kind of issues is faced by a security evaluator when performing a state of the art attack. This analysis leads us to focus on the very common situation where the exact time of the sensitive processing is drown in a large number of leakage points. In this context we propose new ideas to improve the effectiveness and/or efficiency of the three considered attacks. In the particular case of stochastic attacks, we show that the existing literature, essentially developed under the assumption that the exact sensitive time is known, cannot be directly applied when the latter assumption is relaxed. To deal with this issue, we propose an improvement which makes stochastic attack a real alternative to the classical correlation power analysis. Our study is illustrated by various attack experiments performed on several copies of three micro-controllers with different CMOS technologies (respectively 350, 130 and 90 nanometers).

Category / Keywords: implementation / Side-Channel Analysis, Correlation Power Analysis, Template Attacks, Linear Regression Analysis

Original Publication (with major differences): IACR-ASIACRYPT-2013

Date: received 27 Nov 2013

Contact author: th roche at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20131201:163307 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]