Distance Based Leakage Alignment for Side Channel Attacks

被引:7
作者
Yang, Wei [1 ,2 ]
Cao, Yuchen [1 ,2 ]
Zhou, Yongbin [1 ]
Zhang, Hailong [1 ]
Zhang, Qian [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Beijing 100049, Peoples R China
基金
中国国家自然科学基金;
关键词
Alignment; anti-noise performance; shotgun distance; side channel attacks; weighted edit distance; SIGNAL;
D O I
10.1109/LSP.2016.2521441
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Side Channel Attack (SCA) recovers secret information from an embedded device with implementation of cryptographic algorithm by exploiting its physical leakages. For most SCA methods to achieve good performance, the measured leakages are often desired to be well aligned. However, due to some specific reasons such as inaccurate measurements or carefully designed countermeasures, misalignment of leakages frequently occurs in practice. Misalignment significantly reduces the efficiency of SCA methods, or even makes them fail. To address this issue, two alignment approaches are proposed: a local alignment based on shotgun distance and a global alignment based on weighted edit distance. Compared with previous methods, the proposed methods are capable of keeping the secret dependant leakages, while not introducing any redundant information. In addition, the proposed methods could also reduce the negative effects of noise, which is another factor seriously decreasing the efficiency of SCA methods. Interestingly, it is pretty easy to set appropriate parameters for these two methods. Practical experiments show that the proposed methods outperform previous methods in three different circumstances and different noise levels.
引用
收藏
页码:419 / 423
页数:5
相关论文
共 21 条
  • [1] [Anonymous], 2003, MULTIPLE SEQUENCE AL
  • [2] Correlation power analysis with a leakage model
    Brier, E
    Clavier, C
    Olivier, F
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 16 - 29
  • [3] Algebraic Decomposition for Probing Security
    Carlet, Claude
    Prouff, Emmanuel
    Rivain, Matthieu
    Roche, Thomas
    [J]. ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 : 742 - 763
  • [4] Clavier C, 2001, LECT NOTES COMPUT SC, V1965, P252
  • [5] Debande N., 2011, 2011 IEEE International Workshop on Information Forensics and Security (WIFS 2011), DOI 10.1109/WIFS.2011.6123143
  • [6] EM alignment using phase for secure embedded systems
    Gebotys, Catherine
    White, Brian A.
    [J]. DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 2008, 12 (03) : 185 - 206
  • [7] Guilley S, 2011, LECT NOTES COMPUT SC, V6633, P100, DOI 10.1007/978-3-642-21040-2_7
  • [8] Hodgers P, 2013, 2013 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), P131, DOI 10.1109/HST.2013.6581578
  • [9] Jurafsky D., 2012, MINIMUM EDIT DISTANC
  • [10] Le TH, 2007, INT CONF ACOUST SPEE, P257