Cryptology ePrint Archive: Report 2014/332

How to Choose Interesting Points for Template Attacks?

Guangjun Fan, Yongbin Zhou, Hailong Zhang, and Dengguo Feng

Abstract: Template Attacks are widely accepted to be the most powerful side-channel attacks from an information theoretic point of view. For Template Attacks, many papers suggested an accepted guideline for choosing interesting points. The accepted guideline is that one should only choose one point as the interesting point per clock cycle. Up to now, many different methods of choosing interesting points were introduced. However, it is still unclear that which method will lead to the best classification performance for Template Attacks. In this paper, we comprehensively evaluate and compare the classification performance of Template Attacks when using different methods of choosing interesting points. Evaluation results show that the classification performance of Template Attacks has obvious difference when different methods of choosing interesting points are used. The CPA based method and the SOST based method will lead to the best classification performance. Moreover, we find that some of the methods of choosing interesting points provide the same results in the same circumstance. Finally, we correctly and experimentally prove the accepted guideline for choosing interesting points for Template Attacks is correct by presenting a new way of conducting Template Attacks.

Category / Keywords: Cryptographic Devices, Physical Security, Side-Channel Attacks, Power Analysis Attacks, Profiled Side-Channel Attacks, Template Attacks, Interesting Points.

Date: received 11 May 2014, last revised 16 Sep 2014

Contact author: guangjunfan at 163 com

Available format(s): PDF | BibTeX Citation

Version: 20140917:031320 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]