Paper 2022/927

Fit The Joint Moments - How to Attack any Masking Schemes

Valence Cristiani, CEA LETI
Maxime Lecomte, CEA LETI
Thomas Hiscock, CEA LETI
Philippe Maurine, LIRMM
Abstract

Side-Channel Analysis (SCA) allows extracting secret keys manipulated by cryptographic primitives through leakages of their physical implementations. Supervised attacks, known to be optimal, can theoretically defeat any countermeasure, including masking, by learning the dependency between the leakage and the secret through the profiling phase. However, defeating masking is less trivial when it comes to unsupervised attacks. While classical strategies such as CPA or LRA have been extended to masked implementations, we show that these extensions only hold for Boolean and arithmetic schemes. Therefore, we propose a new unsupervised strategy, the Joint Moments Regression (JMR), able to defeat any masking schemes (multiplicative, affine, polynomial, inner product...), which are gaining popularity in real implementations. The main idea behind JMR is to directly regress the leakage model of the shares by fitting a system based on higher-order joint moments conditions. We show that this idea can be seen as part of a more general framework known as the Generalized Method of Moments (GMM). This offers mathematical foundations on which we rely to derive optimizations of JMR. Simulations results confirm the interest of JMR over state-of-the-art attacks, even in the case of Boolean and arithmetic masking. Eventually, we apply this strategy to provide, to the best of our knowledge, the first unsupervised attack on the protected AES implementation proposed by the ANSSI for SCA research, which embeds an affine masking and shuffling counter-measures.

Metadata
Available format(s)
PDF
Publication info
Preprint.
Keywords
Side_Channel MAsking Joint Moment
Contact author(s)
valencecristiani @ gmail com
maxime lecomte @ cea fr
thomas hiscock @ cea fr
philippe maurine @ lirmm fr
History
2022-10-27: last of 2 revisions
2022-07-15: received
See all versions
Short URL
https://ia.cr/2022/927
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2022/927,
      author = {Valence Cristiani and Maxime Lecomte and Thomas Hiscock and Philippe Maurine},
      title = {Fit The Joint Moments - How to Attack any Masking Schemes},
      howpublished = {Cryptology ePrint Archive, Paper 2022/927},
      year = {2022},
      note = {\url{https://eprint.iacr.org/2022/927}},
      url = {https://eprint.iacr.org/2022/927}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.