Paper 2014/583
Template Attacks Based On Priori Knowledge
Guangjun Fan, Yongbin Zhou, Hailong Zhang, and Dengguo Feng
Abstract
Template attacks are widely accepted as the strongest side-channel attacks from the information theoretic point of view, and they can be used as a very powerful tool to evaluate the physical security of cryptographic devices. Template attacks consist of two stages, the profiling stage and the extraction stage. In the profiling stage, the attacker is assumed to have a large number of power traces measured from the reference device, using which he can accurately characterize signals and noises in different points. However, in practice, the number of profiling power traces may not be sufficient. In this case, signals and noises are not accurately characterized, and the key-recovery efficiency of template attacks is significantly influenced. We show that, the attacker can still make template attacks powerfully enough in practice as long as the priori knowledge about the reference device be obtained. We note that, the priori knowledge is just a prior distribution of the signal component of the instantaneous power consumption, which the attacker can easily obtain from his previous experience of conducting template attacks, from Internet and many other possible ways. Evaluation results show that, the priori knowledge, even if not accurate, can still help increase the power of template attacks, which poses a serious threat to the physical security of cryptographic devices.
Metadata
- Available format(s)
- Publication info
- Preprint. MINOR revision.
- Keywords
- Side-Channel AttacksPower Analysis AttacksTemplate AttacksPriori Knowledge.
- Contact author(s)
- guangjunfan @ 163 com
- History
- 2015-07-04: last of 19 revisions
- 2014-07-30: received
- See all versions
- Short URL
- https://ia.cr/2014/583
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/583, author = {Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng}, title = {Template Attacks Based On Priori Knowledge}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/583}, year = {2014}, url = {https://eprint.iacr.org/2014/583} }