You are looking at a specific version 20190403:020613 of this paper. See the latest version.

Paper 2019/345

Second-order Scatter Attack

Hugues Thiebeauld and Aurélien Vasselle and Antoine Wurcker

Abstract

Second-order analyses have shown a great interest to defeat first level of masking protections. Their practical realization remains tedious in a lot of cases. This is partly due to the difficulties of achieving a fine alignment of two areas that are combined together afterward. Classical protections makes therefore use of random jitter or shuffling to make the alignment difficult or even impossible. This paper extends Scatter attack to high-order analyses. Processing the jointdistribution of two selection of points, it becomes possible to retrieve the secret key even when traces are not fully aligned. The results presented in this paper are validated through practical experimentation and compared with existing window-based techniques, such as the FFT. Scatter shows the best results when misalignment is significant. This illustrates that Scatter offers an alternative to existing high-order attacks and can target all kinds of cryptography implementations, regardless they are executed in hardware or software. With the ability to exploit several leakage points, it may be valuable also when applying a second-order attack on aligned traces.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Preprint. MINOR revision.
Keywords
Side-channelMisalignmentScatterSecond-orderMutual InformationSobelImage ProcessingBoolean Masking
Contact author(s)
aurelien vasselle @ eshard com,hugues thieabeauld @ eshard com,antoine wurcker @ eshard com
History
2019-04-03: received
Short URL
https://ia.cr/2019/345
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.