Cryptology ePrint Archive: Report 2014/583
Template Attacks Based On Priori Knowledge
Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
Abstract: Template Attacks are widely accepted as the strongest side-channel attacks from the information theoretic point of view, and they can be used as a very powerful tool to evaluate the physical security of cryptographic devices. Template Attacks consist of two stages, the profiling stage and the extraction stage. In the profiling stage, the attacker is assumed to have a large number of power traces measured from the reference device, using which he can accurately characterize signals and noises in different points. However, in practice, the number of profiling traces may not be sufficient. In this case, signals and noises are not accurately characterized, and the key-recovery efficiency of Template Attacks is significantly influenced. We show that, the attacker can still make Template Attacks powerfully enough in practice as long as the priori knowledge about the reference device be obtained. We note that, the priori knowledge is just a prior distribution of the signal of the instantaneous power consumption. The attacker can easily obtain the priori knowledge from his previous experience of conducting Template Attacks, from Internet and so on. Evaluation results show that, the priori knowledge, even if not accurate, can still help increase the power of Template Attacks, which poses a serious threat to the physical security of cryptographic devices.
Category / Keywords: Side-Channel Attacks, Power Analysis Attacks, Template Attacks, Priori Knowledge.
Date: received 28 Jul 2014, last revised 14 Nov 2014
Contact author: guangjunfan at 163 com
Available format(s): PDF | BibTeX Citation
Version: 20141115:004635 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]