Cryptology ePrint Archive: Report 2013/865
SNR to Success Rate: Reaching the Limit of Non-Profiling DPA
Suvadeep Hajra and Debdeep Mukhopadhyay
Abstract: Many profiling power analysis attacks estimate the
multivariate probability distribution using a profiling step, and thus, can optimally combine the leakages of multiple sample
points. Though there exist several approaches like filtering, Principal Component Analysis for combining the leakages of multiple sample points in non-profiling DPA, their optimality has been been rarely studied. We study the issue of optimally combining the leakages of multiple sample points in non-profiling DPA attacks using a linear function. In this work, our contributions are three-fold: 1) we first derive a relation between the success rate of a CPA attack and the SNR of the power traces, 2) we introduce a multivariate leakage model for Virtex-5 FPGA device, and 3) using the proposed multivariate leakage model, we devise linear filters to maximize the SNR of the output leakage which, in turn, optimizes the success rate of the CPA attacks in a non-profiling setup.
Category / Keywords: DPA, CPA, success rate, leakage model, multivariate leakage model, SNR, filtering, optimal filter, multivariate DPA, PCA, FFT
Date: received 24 Dec 2013, last revised 12 May 2014
Contact author: suvadeep hajra at gmail com
Available format(s): PDF | BibTeX Citation
Version: 20140512:091314 (All versions of this report)
Short URL: ia.cr/2013/865
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]