You are looking at a specific version 20140902:020538 of this paper. See the latest version.

Paper 2014/583

Template Attacks Based On Priori Knowledge

Guangjun Fan and Yongbin Zhou and Dengguo Feng

Abstract

Template Attacks consist of two stages, the profiling stage and the extraction stage. In order to improve the classification performance of Template Attacks, a feasible and usual way is to characterize signals and noises more accurately. Under the assumption that a reference device is fully controlled by the attacker, in the profiling stage, the attacker can operate the reference device as many times as possible and samples a large number of actual power traces to help accurately characterize signals and noises at different interesting points. However, in some practical scenarios, this is not always the case and the attacker can only have access to a limited number of actual power traces. In this paper, we show that the attacker can still make Template Attacks practical and more powerful in the above scenario if he could obtain the priori knowledge about the reference device. The priori knowledge is just a kind of prior distribution of the actual value of the signal component of the instantaneous power consumption, rather than an accurate estimation of it. Evaluation results exhibit that leaking this kind of priori knowledge poses serious threat to the physical security of cryptographic devices.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
Side-Channel AttacksPower Analysis AttacksTemplate AttacksPriori Knowledge.
Contact author(s)
guangjunfan @ 163 com
History
2015-07-04: last of 19 revisions
2014-07-30: received
See all versions
Short URL
https://ia.cr/2014/583
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.