TY - GEN
T1 - Evaluation and improvement of generic-emulating dpa attacks
AU - Wang, Weijia
AU - Yu, Yu
AU - Liu, Junrong
AU - Guo, Zheng
AU - Standaert, François Xavier
AU - Gu, Dawu
AU - Xu, Sen
AU - Fu, Ron
N1 - Publisher Copyright:
© International Association for Cryptologic Research 2015.
PY - 2015
Y1 - 2015
N2 - At CT-RSA 2014, Whitnall, Oswald and Standaert gave the impossibility result that no generic DPA strategies (i. e., without any a priori knowledge about the leakage characteristics) can recover secret information from a physical device by considering an injective target function (e. g., AES and PRESENT S-boxes), and as a remedy, they proposed a slightly relaxed strategy “generic-emulating DPAs” free from the non-injectivity constraint. However, as we show in this paper, the only generic-emulating DPA proposed in their work, namely the SLR-based DPA, suffers from two drawbacks: unstable outcomes in the high-noise regime (i. e., for a small number of traces) and poor performance especially on real smart cards (compared with traditional DPAs with a specific power model). In order to solve these problems, we introduce two new generic-emulating distinguishers, based on lasso and ridge regression strategies respectively, with more stable and better performances than the SLR-based one. Further, we introduce the cross-validation technique that improves the generic-emulating DPAs in general and might be of independent interest. Finally, we compare the performances of all aforementioned generic-emulating distinguishers (both with and without cross-validation) in simulated leakages functions of different degrees, and on an AES ASIC implementation. Our experimental results show that our generic-emulating distinguishers are stable and some of them behave even better than (resp., almost the same as) the best Difference-of-Means distinguishers in simulated leakages (resp., on a real implementation), and thus make themselves good alternatives to traditional DPAs.
AB - At CT-RSA 2014, Whitnall, Oswald and Standaert gave the impossibility result that no generic DPA strategies (i. e., without any a priori knowledge about the leakage characteristics) can recover secret information from a physical device by considering an injective target function (e. g., AES and PRESENT S-boxes), and as a remedy, they proposed a slightly relaxed strategy “generic-emulating DPAs” free from the non-injectivity constraint. However, as we show in this paper, the only generic-emulating DPA proposed in their work, namely the SLR-based DPA, suffers from two drawbacks: unstable outcomes in the high-noise regime (i. e., for a small number of traces) and poor performance especially on real smart cards (compared with traditional DPAs with a specific power model). In order to solve these problems, we introduce two new generic-emulating distinguishers, based on lasso and ridge regression strategies respectively, with more stable and better performances than the SLR-based one. Further, we introduce the cross-validation technique that improves the generic-emulating DPAs in general and might be of independent interest. Finally, we compare the performances of all aforementioned generic-emulating distinguishers (both with and without cross-validation) in simulated leakages functions of different degrees, and on an AES ASIC implementation. Our experimental results show that our generic-emulating distinguishers are stable and some of them behave even better than (resp., almost the same as) the best Difference-of-Means distinguishers in simulated leakages (resp., on a real implementation), and thus make themselves good alternatives to traditional DPAs.
UR - https://www.scopus.com/pages/publications/84946066216
U2 - 10.1007/978-3-662-48324-4_21
DO - 10.1007/978-3-662-48324-4_21
M3 - 会议稿件
AN - SCOPUS:84946066216
SN - 9783662483237
T3 - Lecture Notes in Computer Science
SP - 416
EP - 432
BT - Cryptographic Hardware and Embedded Systems, CHES 2015 - 17th International Workshop, Proceedings
A2 - Güneysu, Tim
A2 - Handschuh, Helena
PB - Springer Verlag
T2 - 17th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015
Y2 - 13 September 2015 through 16 September 2015
ER -