Exploiting the difference of side-channel leakages

COSADE'12 Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design(2012)

引用 17|浏览0
暂无评分
摘要
In this paper, we propose a setup that improves the performance of implementation attacks by exploiting the difference of side-channel leakages. The main idea of our setup is to use two cryptographic devices and to measure the difference of their physical leakages, e.g., their power consumption. This increases the signal-to-noise ratio of the measurement and reduces the number of needed power-consumption traces in order to succeed an attack. The setup can efficiently be applied (but is not limited) in scenarios where two synchronous devices are available for analysis. By applying template-based attacks, only a few power traces are required to successfully identify weak but data-dependent leakage differences. In order to quantify the efficiency of our proposed setup, we performed practical experiments by designing three evaluation boards that assemble different cryptographic implementations. The results of our investigations show that the needed number of traces can be reduced up to 90%.
更多
查看译文
关键词
needed number,side-channel leakage,cryptographic device,evaluation board,implementation attack,different cryptographic implementation,power consumption,data-dependent leakage difference,proposed setup,power trace,needed power-consumption trace
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要