Paper 2017/1217

Linear Regression Side Channel Attack Applied on Constant XOR

Shan Fu, Zongyue Wang, Fanxing Wei, Guoai Xu, and An Wang

Abstract

Linear regression side channel attack (LRA) used to be known as a robust attacking method as it makes use of independent bits leakage. This leakage assumption is more general than Hamming weight/ Hamming distance model used in correlation power attack (CPA). However, in practice, Hamming weight and Hamming distance model suit most devices well. In this paper, we restudy linear regression attack under Hamming weight/ Hamming distance model and propose our novel LRA methods. We find that in many common scenarios LRA is not only an alternative but also a more efficient tool compared with CPA. Two typical cases are recovering keys with XOR operation leakage and chosen plaintext attack on block ciphers with leakages from round output. Simulation results are given to compare with traditional CPA in both cases. Our LRA method achieves up to 400% and 300% improvements for corresponding case compared with CPA respectively. Experiments with AES on SAKURA-G board also prove the efficiency of our methods in practice where 128 key bits are recovered with 1500 traces using XOR operation leakage and one key byte is recovered with only 50 chosen-plaintext traces in the other case.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
linear regressionside channel attackconstant XOR
Contact author(s)
fushan @ caict ac cn
History
2017-12-19: received
Short URL
https://ia.cr/2017/1217
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2017/1217,
      author = {Shan Fu and Zongyue Wang and Fanxing Wei and Guoai Xu and An Wang},
      title = {Linear Regression Side Channel Attack Applied on Constant XOR},
      howpublished = {Cryptology ePrint Archive, Paper 2017/1217},
      year = {2017},
      note = {\url{https://eprint.iacr.org/2017/1217}},
      url = {https://eprint.iacr.org/2017/1217}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.