eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.
You are looking at a specific version 20140328:165132 of this paper. See the latest version.

Paper 2013/842

Detecting Hidden Leakages

Amir Moradi and Sylvain Guilley and Annelie Heuser

Abstract

Reducing the entropy of the mask is a technique which has been proposed to mitigate the high performance overhead of masked software implementations of symmetric block ciphers. Rotating S-box Masking (RSM) is an example of such schemes applied to AES with the purpose of maintaining the security at least against univariate first-order side-channel attacks. This article examines the vulnerability of a realization of such technique using the side-channel measurements publicly available through DPA contest V4. Our analyses which focus on exploiting the first-order leakage of the implementation discover a couple of potential attacks which can recover the secret key. Indeed the leakage we exploit is due to a design mistake as well as the characteristics of the implementation platform, none of which has been considered during the design of the countermeasure (implemented in naive C code).

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. ACNS 2014
Keywords
side-channel analysisleakage detectionvariance testNICVcorrelation-collisionCPAhidden modelslinear regression.
Contact author(s)
amir moradi @ rub de
History
2014-03-28: revised
2013-12-17: received
See all versions
Short URL
https://ia.cr/2013/842
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.