Paper 2017/531
Template Attack vs Bayes Classifier
Stjepan Picek, Annelie Heuser, and Sylvain Guilley
Abstract
Side-channel attacks represent one of the most powerful category of attacks on cryptographic devices with profiled attacks in a promi- nent place as the most powerful among them. Indeed, for instance, template attack is a well-known real-world attack that is also the most powerful attack from the information theoretic perspective. On the other hand, machine learning techniques have proven their quality in a numerous applications where one is definitely side-channel analysis. As one could expect, most of the research concerning supervised machine learning and side-channel analysis concentrated on more powerful machine learning techniques. Although valid from the practical perspective, such attacks often remain lacking from the more theoretical side. In this paper, we investigate several Bayes classifiers, which present simple supervised techniques that have significant similarities with the template attack. More specifically, our analysis aims to investigate what is the influence of the feature (in)dependence in datasets with different amount of noise and to offer further insight into the efficiency of machine learning for side-channel analysis.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Published elsewhere. Minor revision. PROOFS 2016
- Keywords
- Template attackSupervised machine learningBayes classifierFeature dependence
- Contact author(s)
- annelie heuser @ irisa fr
- History
- 2017-06-07: received
- Short URL
- https://ia.cr/2017/531
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2017/531, author = {Stjepan Picek and Annelie Heuser and Sylvain Guilley}, title = {Template Attack vs Bayes Classifier}, howpublished = {Cryptology {ePrint} Archive, Paper 2017/531}, year = {2017}, url = {https://eprint.iacr.org/2017/531} }