Paper 2017/660
Profiling Good Leakage Models For Masked Implementations
Changhai Ou, Zhu Wang, Degang Sun, and Xinping Zhou
Abstract
Leakage model plays a very important role in side channel attacks. An accurate leakage model greatly improves the efficiency of attacks. However, how to profile a "good enough" leakage model, or how to measure the accuracy of a leakage model, is seldom studied. Durvaux et al. proposed leakage certification tests to profile "good enough" leakage model for unmasked implementations. However, they left the leakage model profiling for protected implementations as an open problem. To solve this problem, we propose the first practical higher-order leakage model certification tests for masked implementations. First and second order attacks are performed on the simulations of serial and parallel implementations of a first-order fixed masking. A third-order attack is performed on another simulation of a second-order random masked implementation. The experimental results show that our new tests can profile the leakage models accurately.
Note: we change a mistake in the paper
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Preprint. MINOR revision.
- Keywords
- leakage certificationHODPAmaskingleakage modelside channel attack
- Contact author(s)
- ouchanghai @ iie ac cn
- History
- 2017-07-06: revised
- 2017-07-05: received
- See all versions
- Short URL
- https://ia.cr/2017/660
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2017/660, author = {Changhai Ou and Zhu Wang and Degang Sun and Xinping Zhou}, title = {Profiling Good Leakage Models For Masked Implementations}, howpublished = {Cryptology {ePrint} Archive, Paper 2017/660}, year = {2017}, url = {https://eprint.iacr.org/2017/660} }