### One for All - All for One: Unifying Standard DPA Attacks

Stefan Mangard, Elisabeth Oswald, and Francois-Xavier Standaert

##### Abstract

In this paper, we examine the relationship between and the efficiency of different approaches to standard (univariate) DPA attacks. We first show that, when feeded with the same assumptions about the target device (i.e. with the same leakage model), the most popular approaches such as using a distance-of-means test, correlation analysis, and Bayes attacks are essentially equivalent in this setting. Differences observed in practice are not due to differences in the statistical tests but due to statistical artifacts. Then, we establish a link between the correlation coefficient and the conditional entropy in side-channel attacks. In a first-order attack scenario, this relationship allows linking currently used metrics to evaluate standard DPA attacks (such as the number of power traces needed to perform a key recovery) with an information theoretic metric (the mutual information). Our results show that in the practical scenario defined formally in this paper, both measures are equally suitable to compare devices in respect to their susceptibility to DPA attacks. Together with observations regarding key and algorithm independence we consequently extend theoretical strategies for the sound evaluation of leaking devices towards the practice of side-channel attacks.

Available format(s)
Category
Implementation
Publication info
Published elsewhere. To appear in IET Information Security
Keywords
side-channel attacks
Contact author(s)
fstandae @ uclouvain be
History
2011-01-03: last of 3 revisions
See all versions
Short URL
https://ia.cr/2009/449

CC BY

BibTeX

@misc{cryptoeprint:2009/449,
author = {Stefan Mangard and Elisabeth Oswald and Francois-Xavier Standaert},
title = {One for All - All for One: Unifying Standard DPA Attacks},
howpublished = {Cryptology ePrint Archive, Paper 2009/449},
year = {2009},
note = {\url{https://eprint.iacr.org/2009/449}},
url = {https://eprint.iacr.org/2009/449}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.