Cryptology ePrint Archive: Report 2013/865

SNR to Success Rate: Reaching the Limit of Non-Profiling DPA

Suvadeep Hajra and Debdeep Mukhopadhyay

Abstract: Many profiling power analysis attacks estimate the multivariate probability distribution using a profiling step, and thus, can optimally combine the leakages of multiple sample points. Though there exist several approaches like filtering, Principal Component Analysis for combining the leakages of multiple sample points in non-profiling DPA, their optimality has been been rarely studied. We study the issue of optimally combining the leakages of multiple sample points in non-profiling DPA attacks using a linear function. In this work, our contributions are three-fold: 1) we first derive a relation between the success rate of a CPA attack and the SNR of the power traces, 2) we introduce a multivariate leakage model for Virtex-5 FPGA device, and 3) using the proposed multivariate leakage model, we devise linear filters to maximize the SNR of the output leakage which, in turn, optimizes the success rate of the CPA attacks in a non-profiling setup.

Category / Keywords: DPA, CPA, success rate, leakage model, multivariate leakage model, SNR, filtering, optimal filter, multivariate DPA, PCA, FFT

Date: received 24 Dec 2013, last revised 12 May 2014

Contact author: suvadeep hajra at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20140512:091314 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]