eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.

Paper 2016/294

Evaluation and Improvement of Generic-Emulating DPA Attacks

Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, François-Xavier Standaert, Dawu Gu, Sen Xu, and Rong Fu

Abstract

At CT-RSA 2014, Whitnall, Oswald and Standaert gave the impossibility result that no generic DPA strategies (i.e., without any \emph{a priori} knowledge about the leakage characteristics) can recover secret information from a physical device by considering an injective target function (e.g., AES and PRESENT S-boxes), and as a remedy, they proposed a slightly relaxed strategy ``generic-emulating DPAs'' free from the non-injectivity constraint. However, as we show in this paper, the only generic-emulating DPA proposed in their work, namely the SLR-based DPA, suffers from two drawbacks: unstable outcomes in the high-noise regime (i.e., for a small number of traces) and poor performance especially on real smart cards (compared with traditional DPAs with a specific power model). In order to solve these problems, we introduce two new generic-emulating distinguishers, based on lasso and ridge regression strategies respectively, with more stable and better performances than the SLR-based one. Further, we introduce the cross-validation technique that improves the generic-emulating DPAs in general and might be of independent interest. Finally, we compare the performances of all aforementioned generic-emulating distinguishers (both with and without cross-validation) in simulated leakages functions of different degrees, and on an AES ASIC implementation. Our experimental results show that our generic-emulating distinguishers are stable and some of them behave even better than (resp., almost the same as) the best Difference-of-Means distinguishers in simulated leakages (resp., on a real implementation), and thus make themselves good alternatives to traditional DPAs.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
A minor revision of an IACR publication in CHES 2015
DOI
10.1007/978-3-662-48324-4_21
Keywords
generic side-channel attacklinear regressioncross-validation
Contact author(s)
aawwjaa @ sjtu edu cn
yyuu @ sjtu edu cn
fstandea @ uclouvain be
History
2016-03-18: revised
2016-03-17: received
See all versions
Short URL
https://ia.cr/2016/294
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/294,
      author = {Weijia Wang and Yu Yu and Junrong Liu and Zheng Guo and François-Xavier Standaert and Dawu Gu and Sen Xu and Rong Fu},
      title = {Evaluation and Improvement of Generic-Emulating DPA Attacks},
      howpublished = {Cryptology ePrint Archive, Paper 2016/294},
      year = {2016},
      doi = {10.1007/978-3-662-48324-4_21},
      note = {\url{https://eprint.iacr.org/2016/294}},
      url = {https://eprint.iacr.org/2016/294}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.