Cryptology ePrint Archive: Report 2015/045

Reliable Information Extraction for Single Trace Attacks

Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall

Abstract: Side-channel attacks using only a single trace crucially rely on the capability of reliably extracting side-channel information (e.g. Hamming weights of intermediate target values) from traces. In particular, in original versions of simple power analysis (SPA) or algebraic side channel attacks (ASCA) it was assumed that an adversary can correctly extract the Hamming weight values for all the intermediates used in an attack. Recent developments in error tolerant SPA style attacks relax this unrealistic requirement on the information extraction and bring renewed interest to the topic of template building or training suitable machine learning classifiers. In this work we ask which classifiers or methods, if any, are most likely to return the true Hamming weight among their first (say $s$) ranked outputs. We experiment on two data sets with different leakage characteristics. Our experiments show that the most suitable classifiers to reach the required performance for pragmatic SPA attacks are Gaussian templates, Support Vector Machines and Random Forests, across the two data sets that we considered. We found no configuration that was able to satisfy the requirements of an error tolerant ASCA in case of complex leakage.

Category / Keywords: applications / template attacks, machine learning

Original Publication (in the same form): DATE'15 Proceedings

Date: received 19 Jan 2015

Contact author: valentina banciu at bristol ac uk

Available format(s): PDF | BibTeX Citation

Version: 20150120:075511 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]