DocumentCode :
3056762
Title :
Entropy-based power attack
Author :
Maghrebi, Houssem ; Guilley, Sylvain ; Danger, Jean-Luc ; Flament, Florent
Author_Institution :
Dept. COMELEC, TELECOM ParisTech, Paris, France
fYear :
2010
fDate :
13-14 June 2010
Firstpage :
1
Lastpage :
6
Abstract :
Recent works have shown that the mutual information is a generic side-channel distinguisher, since it detects any kind of statistical dependency between leakage observations and hypotheses on the secret. In this study the mutual information analysis (MIA) is tested in a noisy real world design. It indeed appears to be a powerful approach to break unprotected implementations. However, the MIA fails when applied on a DES cryptoprocessor with masked substitution boxes (Sboxes) in ROM. Nevertheless, this masking implementation remains sensitive to Higher-Order Differential Power Analysis (HO-DPA). For instance, an attack based on a variance analysis clearly shows the vulnerabilities of a first order masking countermeasure. We propose a novel approach to information-theoretic HO attacks, called the Entropy-based Power Analysis (EPA). This new attack gives a greatest importance to highly informative partitions and in the meantime better distinguishes between the key hypotheses. A thorough empirical evaluation of the proposed attack confirms the overwhelming advantage of this new approach when compared with MIA.
Keywords :
cryptography; entropy; field programmable gate arrays; DES cryptoprocessor; entropy based power analysis; entropy based power attack; generic side channel distinguisher; higher order differential power analysis; leakage observations; masked substitution boxes; mutual information analysis; statistical dependency; Algorithm design and analysis; Analysis of variance; Cryptography; Entropy; Field programmable gate arrays; Information analysis; Mutual information; Read only memory; Telecommunications; Testing; Entropy-based Power Analysis (EPA); FPGA; High-Order Differential Power Analysis (HO-DPA); Mutual Information Analysis (MIA); Side-channel attack; Variance-based Power Attack (VPA); masking countermeasure;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Hardware-Oriented Security and Trust (HOST), 2010 IEEE International Symposium on
Conference_Location :
Anaheim, CA
Print_ISBN :
978-1-4244-7811-8
Type :
conf
DOI :
10.1109/HST.2010.5513124
Filename :
5513124
Link To Document :
بازگشت