Paper 2022/927
Fit The Joint Moments - How to Attack any Masking Schemes
Abstract
Side-Channel Analysis (SCA) allows extracting secret keys manipulated by cryptographic primitives through leakages of their physical implementations. Supervised attacks, known to be optimal, can theoretically defeat any countermeasure, including masking, by learning the dependency between the leakage and the secret through the profiling phase. However, defeating masking is less trivial when it comes to unsupervised attacks. While classical strategies such as CPA or LRA have been extended to masked implementations, we show that these extensions only hold for Boolean and arithmetic schemes. Therefore, we propose a new unsupervised strategy, the Joint Moments Regression (JMR), able to defeat any masking schemes (multiplicative, affine, polynomial, inner product...), which are gaining popularity in real implementations. The main idea behind JMR is to directly regress the leakage model of the shares by fitting a system based on higher-order joint moments conditions. We show that this idea can be seen as part of a more general framework known as the Generalized Method of Moments (GMM). This offers mathematical foundations on which we rely to derive optimizations of JMR. Simulations results confirm the interest of JMR over state-of-the-art attacks, even in the case of Boolean and arithmetic masking. Eventually, we apply this strategy to provide, to the best of our knowledge, the first unsupervised attack on the protected AES implementation proposed by the ANSSI for SCA research, which embeds an affine masking and shuffling counter-measures.
Metadata
- Available format(s)
- Publication info
- Preprint.
- Keywords
- Side_Channel MAsking Joint Moment
- Contact author(s)
-
valencecristiani @ gmail com
maxime lecomte @ cea fr
thomas hiscock @ cea fr
philippe maurine @ lirmm fr - History
- 2022-10-27: last of 2 revisions
- 2022-07-15: received
- See all versions
- Short URL
- https://ia.cr/2022/927
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2022/927, author = {Valence Cristiani and Maxime Lecomte and Thomas Hiscock and Philippe Maurine}, title = {Fit The Joint Moments - How to Attack any Masking Schemes}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/927}, year = {2022}, url = {https://eprint.iacr.org/2022/927} }