Filters








3,058 Hits in 3.2 sec

Profiling DPA: Efficacy and Efficiency Trade-Offs [chapter]

Carolyn Whitnall, Elisabeth Oswald
2013 Lecture Notes in Computer Science  
Empirical comparisons between these and the 'classical' approach to template building have confirmed the reduction in profiling complexity to achieve the same attack-phase success, but have focused on  ...  In this contribution we evaluate-from a theoretic perspective as much as possible-the performance of linear regression-based templating in a variety of realistic leakage scenarios as the complexity of  ...  Historically, the phrase 'template attack' denoted the multivariate Gaussian model variant with full noise characterisation [4] -regarded as the most powerful but also the most impractical method.  ... 
doi:10.1007/978-3-642-40349-1_3 fatcat:trbwayfigzhl7ecdctc3kdwkee

Template Attacks on ECDSA [chapter]

Marcel Medwed, Elisabeth Oswald
2009 Lecture Notes in Computer Science  
Template attacks have been considered exclusively in the context of implementations of symmetric cryptographic algorithms on 8-bit devices.  ...  In this article we show that even SPA resistant implementations of ECDSA on a typical 32-bit platform succumb to template-based SPA attacks.  ...  This article presents the first work on template attacks in the context of implementations of asymmetric cryptographic algorithms.  ... 
doi:10.1007/978-3-642-00306-6_2 fatcat:s55hibjxqnhu5oecv3uekq3vdi

Templates vs. Stochastic Methods [chapter]

Benedikt Gierlichs, Kerstin Lemke-Rust, Christof Paar
2006 Lecture Notes in Computer Science  
For a systematic comparison of Template Attacks and the Stochastic Model, we use two sets of measurement data that originate from two different microcontrollers and setups.  ...  Template Attacks and the Stochastic Model provide advanced methods for side channel cryptanalysis that make use of 'a-priori' knowledge gained from a profiling step.  ...  The research was done in cooperation with gemalto. Supported by the European Commission through the IST Contract IST-2002-507932 ECRYPT, the European Network of Excellence in Cryptology.  ... 
doi:10.1007/11894063_2 fatcat:7fdqsmsbt5hkjcj4mudiwmfg3q

Breaking Cryptographic Implementations Using Deep Learning Techniques [chapter]

Houssem Maghrebi, Thibault Portigliatti, Emmanuel Prouff
2016 Lecture Notes in Computer Science  
Template attack is the most common and powerful profiled side channel attack.  ...  It relies on a realistic assumption regarding the noise of the device under attack: the probability density function of the data is a multivariate Gaussian distribution.  ...  Besides, authors in [23] have shown that the SVM-based attack outperforms the template attack when applied on highly noisy traces.  ... 
doi:10.1007/978-3-319-49445-6_1 fatcat:rljymn7hprdtpoz3nbt5r73dye

The bias–variance decomposition in profiled attacks

Liran Lerman, Gianluca Bontempi, Olivier Markowitch
2015 Journal of Cryptographic Engineering  
We elucidate the reasons underlying the success of different profiled attacks (that depend essentially on the context) based on the well-known bias-variance tradeoff developed in the machine learning field  ...  We show (1) how to decompose (in three additive components) the error rate of an attack based on the bias-variance decomposition, and (2) how to reduce the error rate of a model based on the bias-variance  ...  Note that the result of template attack on this context can be seen with the stochastic attack of degree 8.  ... 
doi:10.1007/s13389-015-0106-1 fatcat:yptqybkvrzhtdov5bq32354ehe

It Started with Templates: The Future of Profiling in Side-Channel Analysis [chapter]

Lejla Batina, Milena Djukanovic, Annelie Heuser, Stjepan Picek
2021 Security of Ubiquitous Computing Systems  
AbstractSide-channel attacks (SCAs) are powerful attacks based on the information obtained from the implementation of cryptographic devices.  ...  Profiling side-channel attacks has received a lot of attention in recent years due to the fact that this type of attack defines the worst-case security assumptions.  ...  Context of Template Attack In the pioneering template attacks article of Chari, Rao, and Rohatgi, it is shown that template attacks apply advanced statistical methods and can break implementations secure  ... 
doi:10.1007/978-3-030-10591-4_8 fatcat:n55qmriqyjc57kizbtriegkkmu

Robust Profiling for DPA-Style Attacks [chapter]

Carolyn Whitnall, Elisabeth Oswald
2015 Lecture Notes in Computer Science  
Profiled side-channel attacks are understood to be powerful when applicable: in the best case when an adversary can comprehensively characterise the leakage, the resulting model leads to attacks requiring  ...  This severely limits the applicability of profiled attacks in practice and so poses an interesting research challenge: how can we design profiled distinguishers that can tolerate (some) differences between  ...  The authors would like to thank Thomas Korak, Thomas Plos and Michael Hutter at TU Graz for supplying us with data from the TAMPRES project [1, 13] .  ... 
doi:10.1007/978-3-662-48324-4_1 fatcat:4q5tk4fwj5dhdierzonddsnywi

Template attacks on nano-scale CMOS devices

Bastian Richter, Amir Moradi
2020 Journal of Cryptographic Engineering  
By performing attacks on multiple samples of the same ASIC, we show that template attacks on small technology sizes are still successful.  ...  Profiled attacks are widely considered to be the most powerful form of side-channel analysis attacks.  ...  Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as  ... 
doi:10.1007/s13389-020-00225-8 fatcat:vijrgf2hcrg35p5zemucqbqqzy

Efficient, Portable Template Attacks

Marios O. Choudary, Markus G. Kuhn
2018 IEEE Transactions on Information Forensics and Security  
We identify several practical obstacles arising in the implementation of template attacks, ranging from numerical errors to the incompatibility of templates across different devices, and propose and compare  ...  Index Terms-Hardware security, side-channel attack, template attack, power analysis.  ...  Data and Code Availability: In the interest of reproducible research we make available our data and associated MATLAB scripts [29] .  ... 
doi:10.1109/tifs.2017.2757440 fatcat:qu4b4euoavbonpfwv7q7rridlm

An overview of side channel analysis attacks

Thanh-Ha Le, Cécile Canovas, Jessy Clédière
2008 Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS '08  
In this paper, we present the attacks with an easy comprehensible way and focus on their implementation aspect.  ...  Differential Power Analysis, Correlation Power Analysis) and attacks using a reference device (e.g. Template Attack, Stochastic Model Attack).  ...  In conclusion, the choice of an attack method depends on the attacker's context. If he has a device which is identical to the attacked one, the template (or stochastic) attack is the best choice.  ... 
doi:10.1145/1368310.1368319 dblp:conf/ccs/LeCC08 fatcat:usybbkmdzjcjjej2m3tzhy4zvm

Information Theoretic and Security Analysis of a 65-Nanometer DDSLL AES S-Box [chapter]

Mathieu Renauld, Dina Kamel, François-Xavier Standaert, Denis Flandre
2011 Lecture Notes in Computer Science  
In a recent work from Eurocrypt 2011, Renauld et al. discussed the impact of the increased variability in nanoscale CMOS devices on their evaluation against side-channel attacks.  ...  Our results show that the security improvement of the DDSLL S-box is typically in the range of one order of magnitude (in terms of "number of traces to recover the key").  ...  In the case of a worst-case template attack, it typically corresponds to one order of magnitude, in terms of number of measurements to recover the key.  ... 
doi:10.1007/978-3-642-23951-9_15 fatcat:t2xxwhyo4jcbjdis4tkybvzj6m

The World Is Not Enough: Another Look on Second-Order DPA [chapter]

François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard
2010 Lecture Notes in Computer Science  
In this paper, we show that in the context of multivariate attacks against masked implementations, this conclusion does not hold anymore.  ...  In a recent work, Mangard et al. showed that under certain assumptions, the (so-called) standard univariate side-channel attacks using a distance-of-means test, correlation analysis and Gaussian templates  ...  -computational power when performing attacks based on real measurements).  ... 
doi:10.1007/978-3-642-17373-8_7 fatcat:n3kgpqylyfbp3czrekvnpdatpe

Low Entropy Masking Schemes, Revisited [chapter]

Vincent Grosso, François-Xavier Standaert, Emmanuel Prouff
2014 Lecture Notes in Computer Science  
Our conclusions are contrasted: they confirm the theoretical interest of the countermeasure, while suggesting that its exploitation in actual products may be risky, because of hard(er) to control hardware  ...  Previous works have put forward the interest of this approach when such conditions are met.  ...  In general, it is of course natural to consider multivariate attacks, since the shares used in any masked implementation have to be generated on chip, which possibly leaks information.  ... 
doi:10.1007/978-3-319-14123-7_3 fatcat:5i2kpfrh4rd77azqwdxvzxpxkm

Side-channel based intrusion detection for industrial control systems [article]

Pol Van Aubel, Łukasz Chmielewski Riscure BV, Delft, the Netherlands, Delft University of Technology, Department of Intelligent Systems)
2017 arXiv   pre-print
To demonstrate the feasibility of this method, we show it is possible to profile and distinguish between even small changes in programs on Siemens S7-317 PLCs, using methods from cryptographic side-channel  ...  We propose a system that uses electromagnetic side-channel measurements to detect behavioural changes of the software running on industrial control systems.  ...  Multivariate Templates The results of multivariate templating show significant improvements upon the simpler models.  ... 
arXiv:1712.05745v1 fatcat:i6s6m4bc3fhzzlbwpi74d52ove

Low Entropy Masking Schemes, Revisited [chapter]

Vincent Grosso, François-Xavier Standaert, Emmanuel Prouff
2014 Lecture Notes in Computer Science  
Our conclusions are contrasted: they confirm the theoretical interest of the countermeasure, while suggesting that its exploitation in actual products may be risky, because of hard(er) to control hardware  ...  Previous works have put forward the interest of this approach when such conditions are met.  ...  In general, it is of course natural to consider multivariate attacks, since the shares used in any masked implementation have to be generated on chip, which possibly leaks information.  ... 
doi:10.1007/978-3-319-08302-5_3 fatcat:fnqi3zdjwfc6riu7qoskjs3zri
« Previous Showing results 1 — 15 out of 3,058 results