Paper 2024/589
Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training
Abstract
Side-Channel Attacks target the recovery of key material in cryptographic implementations by measuring physical quantities such as power consumption during the execution of a program. Simple Power Attacks consist in deducing secret information from a trace using a single or a few samples, as opposed to differential attacks which require many traces. Software cryptographic implementations now all contain a data-independent execution path, but often do not consider variations in power consumption associated to data. In this work, we show that a technique commonly used to select a value from different possible values in a control-independant way leads to significant power differences depending on the value selected. This difference is actually so important that a single sample can be considered for attacking one condition, and no training on other traces is required. We exploit this finding to propose the first single-trace attack without any knowledge gained on previous executions, using trace folding. We target the two modular exponentiation implementations in Libgcrypt, getting respectively 100% and 99.98% of correct bits in average on 30 executions using 2,048-bit exponents. We also use this technique to attack the scalar multiplication in ECDSA, successfully recovering all secret nonces on 1,000 executions. Finally, the insights we gained from this work allow us to show that a proposed counter-measure from the litterature for performing the safe loading of precomputed operands in the context of windowed implementations can be attacked as well.
Metadata
- Available format(s)
- Category
- Attacks and cryptanalysis
- Publication info
- Published by the IACR in TCHES 2025
- Keywords
- Simple Power AttackModular ExponentiationECDSAConstant-Time ImplementationSide-Channel Attacks
- Contact author(s)
-
xunyue hu @ lip6 fr
quentin meunier @ lip6 fr
emmanuelle encrenaz @ lip6 fr - History
- 2024-10-14: last of 3 revisions
- 2024-04-16: received
- See all versions
- Short URL
- https://ia.cr/2024/589
- License
-
CC BY-NC
BibTeX
@misc{cryptoeprint:2024/589, author = {Xunyue Hu and Quentin L. Meunier and Emmanuelle Encrenaz}, title = {Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/589}, year = {2024}, url = {https://eprint.iacr.org/2024/589} }