eprint.iacr.org will be offline for approximately an hour for routine maintenance again at 10pm UTC on Wednesday, April 17.

Paper 2007/443

Template Attacks with a Power Model

Moulay Abdelaziz EL AABID, Sylvain GUILLEY, and Philippe HOOGVORST

Abstract

This article analyses some properties of the \emph{template attack}. Examples come from attacks against an unprotected ASIC implementation of DES. The principal components analysis (PCA) is used to represent the templates in two dimensions. We give a physical interpretation of the templates PCA eigenvalues and eigenvectors. We show that the S-boxes are \emph{not} the target of template attacks. We point out that the efficiency of template attacks on unprotected implementations can be unleashed by using a power model. The most suitable power-model happens to be linked to the key schedule. This casts a new light on key schedule requirements for SCA resistance against a ``template'' attacker. The results are tailored for DES, because this symmetric block cipher is emblematic and is still promised a long life. Its key schedule is also remarkably simple, with cryptanalytic weaknesses,that paradoxically turn out to be a strength against SCA.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
Template attacksprincipal component analysisside-channel attack
Contact author(s)
elaabid @ enst fr
History
2007-12-06: last of 2 revisions
2007-12-05: received
See all versions
Short URL
https://ia.cr/2007/443
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2007/443,
      author = {Moulay Abdelaziz EL AABID and Sylvain GUILLEY and Philippe HOOGVORST},
      title = {Template Attacks with a Power Model},
      howpublished = {Cryptology ePrint Archive, Paper 2007/443},
      year = {2007},
      note = {\url{https://eprint.iacr.org/2007/443}},
      url = {https://eprint.iacr.org/2007/443}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.