Non-profiled Mask Recovery: the impact of Independent Component Analysis

Si Gao, Elisabeth Oswald, Hua Chen, and Wei Xi

Abstract

As one of the most prevalent SCA countermeasures, masking schemes are designed to defeat a broad range of side channel attacks. An attack vector that is suitable for low-order masking schemes is to try and directly determine the mask(s) (for each trace) by utilising the fact that often an attacker has access to several leakage points of the respectively used mask(s). Good examples for implementations of low order masking schemes are the based on table re-computations and also the masking scheme in DPAContest V4.2. We propose a novel approach based on Independent Component Analysis (ICA) to efficiently utilise the information from several leakage points to reconstruct the respective masks (for each trace) and show it is a competitive attack vector in practice.

Available format(s)
Category
Implementation
Publication info
Published elsewhere. MINOR revision.CARDIS 2018
Keywords
Contact author(s)
si gao @ bristol ac uk
History
Short URL
https://ia.cr/2018/871

CC BY

BibTeX

@misc{cryptoeprint:2018/871,
author = {Si Gao and Elisabeth Oswald and Hua Chen and Wei Xi},
title = {Non-profiled Mask Recovery: the impact of Independent Component Analysis},
howpublished = {Cryptology ePrint Archive, Paper 2018/871},
year = {2018},
note = {\url{https://eprint.iacr.org/2018/871}},
url = {https://eprint.iacr.org/2018/871}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.