Cryptology ePrint Archive: Report 2015/045
Reliable Information Extraction for Single Trace Attacks
Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall
Abstract: Side-channel attacks using only a single trace crucially
rely on the capability of reliably extracting side-channel
information (e.g. Hamming weights of intermediate target values)
from traces. In particular, in original versions of simple power
analysis (SPA) or algebraic side channel attacks (ASCA) it was
assumed that an adversary can correctly extract the Hamming
weight values for all the intermediates used in an attack. Recent
developments in error tolerant SPA style attacks relax this
unrealistic requirement on the information extraction and bring
renewed interest to the topic of template building or training
suitable machine learning classifiers.
In this work we ask which classifiers or methods, if any, are
most likely to return the true Hamming weight among their first
(say $s$) ranked outputs. We experiment on two data sets with
different leakage characteristics. Our experiments show that the
most suitable classifiers to reach the required performance for
pragmatic SPA attacks are Gaussian templates, Support Vector
Machines and Random Forests, across the two data sets that we
considered. We found no configuration that was able to satisfy
the requirements of an error tolerant ASCA in case of complex
leakage.
Category / Keywords: applications / template attacks, machine learning
Original Publication (in the same form): DATE'15 Proceedings
Date: received 19 Jan 2015
Contact author: valentina banciu at bristol ac uk
Available format(s): PDF | BibTeX Citation
Version: 20150120:075511 (All versions of this report)
Short URL: ia.cr/2015/045
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]