You are looking at a specific version 20071206:142425 of this paper. See the latest version.

Paper 2007/443

Template Attacks with a Power Model

Moulay Abdelaziz EL AABID and Sylvain GUILLEY and Philippe HOOGVORST

Abstract

This article analyses some properties of the \emph{template attack}. Examples come from attacks against an unprotected ASIC implementation of DES. The principal components analysis (PCA) is used to represent the templates in two dimensions. We give a physical interpretation of the templates PCA eigenvalues and eigenvectors. We show that the S-boxes are \emph{not} the target of template attacks. We point out that the efficiency of template attacks on unprotected implementations can be unleashed by using a power model. The most suitable power-model happens to be linked to the key schedule. This casts a new light on key schedule requirements for SCA resistance against a ``template'' attacker. The results are tailored for DES, because this symmetric block cipher is emblematic and is still promised a long life. Its key schedule is also remarkably simple, with cryptanalytic weaknesses,that paradoxically turn out to be a strength against SCA.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
Template attacksprincipal component analysisside-channel attack
Contact author(s)
elaabid @ enst fr
History
2007-12-06: last of 2 revisions
2007-12-05: received
See all versions
Short URL
https://ia.cr/2007/443
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.