Cryptology ePrint Archive: Report 2017/531

Template Attack vs Bayes Classifier

Stjepan Picek and Annelie Heuser and Sylvain Guilley

Abstract: Side-channel attacks represent one of the most powerful category of attacks on cryptographic devices with profiled attacks in a promi- nent place as the most powerful among them. Indeed, for instance, template attack is a well-known real-world attack that is also the most powerful attack from the information theoretic perspective. On the other hand, machine learning techniques have proven their quality in a numerous applications where one is definitely side-channel analysis. As one could expect, most of the research concerning supervised machine learning and side-channel analysis concentrated on more powerful machine learning techniques. Although valid from the practical perspective, such attacks often remain lacking from the more theoretical side. In this paper, we investigate several Bayes classifiers, which present simple supervised techniques that have significant similarities with the template attack. More specifically, our analysis aims to investigate what is the influence of the feature (in)dependence in datasets with different amount of noise and to offer further insight into the efficiency of machine learning for side-channel analysis.

Category / Keywords: implementation / Template attack, Supervised machine learning, Bayes classifier, Feature dependence

Original Publication (with minor differences): PROOFS 2016

Date: received 5 Jun 2017

Contact author: annelie heuser at irisa fr

Available format(s): PDF | BibTeX Citation

Version: 20170607:035331 (All versions of this report)

Short URL: ia.cr/2017/531

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]