Paper 2014/410

Soft Analytical Side-Channel Attacks

Nicolas Veyrat-Charvillon, Benoît Gérard, and François-Xavier Standaert

Abstract

In this paper, we introduce a new approach to side-channel key recovery, that combines the low time/memory complexity and noise tolerance of standard (divide and conquer) differential power analysis with the optimal data complexity of algebraic side-channel attacks. Our fundamental contribution for this purpose is to change the way of expressing the problem, from the system of equations used in algebraic attacks to a code, essentially inspired by low density parity check codes. We then show that such codes can be efficiently decoded, taking advantage of the sparsity of the information corresponding to intermediate variables in actual leakage traces. The resulting soft analytical side-channel attacks work under the same profiling assumptions as template attacks, and directly exploit the vectors of probabilities produced by these attacks. As a result, we bridge the gap between popular side-channel distinguishers based on simple statistical tests and previous approaches to analytical side-channel attacks that could only exploit hard information so far.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint. MINOR revision.
Contact author(s)
fstandae @ uclouvain be
History
2014-06-04: received
Short URL
https://ia.cr/2014/410
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/410,
      author = {Nicolas Veyrat-Charvillon and Benoît Gérard and François-Xavier Standaert},
      title = {Soft Analytical Side-Channel Attacks},
      howpublished = {Cryptology ePrint Archive, Paper 2014/410},
      year = {2014},
      note = {\url{https://eprint.iacr.org/2014/410}},
      url = {https://eprint.iacr.org/2014/410}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.