Paper 2015/402

Success through confidence: Evaluating the effectiveness of a side-channel attack

Adrian Thillard, Emmanuel Prouff, and Thomas Roche

Abstract

Side-channel attacks usually apply a divide-and-conquer strategy, separately recovering different parts of the secret. Their efficiency in practice relies on the adversary ability to precisely assess the success or unsucces of each of these recoveries. This makes the study of the attack success rate a central problem in side-channel analysis. In tis paper we tackle this issue in two different settings for the most popular attack, namely the Correlation Power Analysis (CPA). In the first setting, we assume that the targeted subkey is known and we compare the state of the art formulae expressing the success rate as a function of the leakage noise and the algebraic properties of the cryptographic primitive. We also make the link between these formulae and the recent work of Fei et al. at CHES 2012. In the second setting, the subkey is no longer assumed to be known and we introduce the notion of confidence level in an attack result, allowing for the study of different heuristics. Through experiments, we show that the rank evolution of a subkey hypothesis can be exploited to compute a better confidence than considering only the final result.

Metadata
Available format(s)
PDF
Publication info
A minor revision of an IACR publication in CHES 2013
Contact author(s)
adrian thillard @ ssi gouv fr
History
2015-05-04: revised
2015-05-01: received
See all versions
Short URL
https://ia.cr/2015/402
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/402,
      author = {Adrian Thillard and Emmanuel Prouff and Thomas Roche},
      title = {Success through confidence: Evaluating the effectiveness of a side-channel attack},
      howpublished = {Cryptology ePrint Archive, Paper 2015/402},
      year = {2015},
      note = {\url{https://eprint.iacr.org/2015/402}},
      url = {https://eprint.iacr.org/2015/402}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.