Cryptology ePrint Archive: Report 2014/1020
Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance
Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm
Abstract: Security and safety critical devices must undergo penetration testing including Side-Channel Attacks (SCA) before certification.
SCA are powerful and easy to mount but often need huge computation power, especially in the presence of countermeasures.
Few efforts have been done to reduce the computation complexity of SCA by selecting a small subset of points where leakage prevails.
In this paper, we propose a method to detect relevant leakage points in side-channel traces.
The method is based on Normalized Inter-Class Variance (NICV).
A key advantage of NICV over state-of-the-art is that NICV does neither need a clone device nor the knowledge of secret parameters of the crypto-system.
NICV has a low computation requirement and it detects leakage using public information like input plaintexts or output ciphertexts only.
It is shown that NICV can be related to Pearson correlation and signal to noise ratio (SNR) which are standard metrics.
NICV can be used to theoretically compute the minimum number of traces required to attack an implementation.
A theoretical rationale of NICV with some practical application on real crypto-systems are provided to support our claims.
Category / Keywords: implementation /
Original Publication (with minor differences): HASP 2014
DOI: 10.1145/2611765.2611772
Date: received 25 Dec 2014, last revised 1 Jul 2015
Contact author: sylvain guilley at telecom-paristech fr
Available format(s): PDF | BibTeX Citation
Note: We have added in Section 3.2 the formula for the empirical estimation of NICV.
Version: 20150701:174108 (All versions of this report)
Short URL: ia.cr/2014/1020
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]