Paper 2024/589

Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training

Xunyue Hu
Quentin L. Meunier, Laboratoire de Recherche en Informatique de Paris 6
Emmanuelle Encrenaz, Laboratoire de Recherche en Informatique de Paris 6
Abstract

Side-Channel Attacks target the recovery of key material in cryptographic implementations by measuring physical quantities such as power consumption during the execution of a program. Simple Power Attacks consist in deducing secret information from a trace using a single or a few samples, as opposed to differential attacks which require many traces. Software cryptographic implementations now all contain a data-independent execution path, but often do not consider variations in power consumption associated to data. In this work, we show that a technique commonly used to select a value from different possible values in a control-independant way leads to significant power differences depending on the value selected. This difference is actually so important that a single sample can be considered for attacking one condition, and no training on other traces is required. We exploit this finding to propose the first single-trace attack without any knowledge gained on previous executions, using trace folding. We target the two modular exponentiation implementations in Libgcrypt, getting respectively 100% and 99.98% of correct bits in average on 30 executions using 2,048-bit exponents. We also use this technique to attack the scalar multiplication in ECDSA, successfully recovering all secret nonces on 1,000 executions. Finally, the insights we gained from this work allow us to show that a proposed counter-measure from the litterature for performing the safe loading of precomputed operands in the context of windowed implementations can be attacked as well.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Published by the IACR in TCHES 2025
Keywords
Simple Power AttackModular ExponentiationECDSAConstant-Time ImplementationSide-Channel Attacks
Contact author(s)
xunyue hu @ lip6 fr
quentin meunier @ lip6 fr
emmanuelle encrenaz @ lip6 fr
History
2024-10-14: last of 3 revisions
2024-04-16: received
See all versions
Short URL
https://ia.cr/2024/589
License
Creative Commons Attribution-NonCommercial
CC BY-NC

BibTeX

@misc{cryptoeprint:2024/589,
      author = {Xunyue Hu and Quentin L. Meunier and Emmanuelle Encrenaz},
      title = {Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/589},
      year = {2024},
      url = {https://eprint.iacr.org/2024/589}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.