Less is More Dimensionality Reduction from a Theoretical Perspective

被引:21
作者
Bruneau, Nicolas [1 ,2 ]
Guilley, Sylvain [1 ,3 ]
Heuser, Annelie [1 ]
Marion, Damien [1 ,3 ]
Rioul, Olivier [1 ,4 ]
机构
[1] Telecom ParisTech, Inst Mines Telecom, Paris, France
[2] STMicroelectronics, AST Div, Rousset, France
[3] Secure IC SAS, Threat Anal Business Line, Rennes, France
[4] Ecole Polytech, Appl Math Dept, Palaiseau, France
来源
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015 | 2015年 / 9293卷
关键词
TEMPLATE ATTACKS; POWER;
D O I
10.1007/978-3-662-48324-4_2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Reducing the dimensionality of the measurements is an important problem in side-channel analysis. It allows to capture multi-dimensional leakage as one single compressed sample, and therefore also helps to reduce the computational complexity. The other side of the coin with dimensionality reduction is that it may at the same time reduce the efficiency of the attack, in terms of success probability. In this paper, we carry out a mathematical analysis of dimensionality reduction. We show that optimal attacks remain optimal after a first pass of preprocessing, which takes the form of a linear projection of the samples. We then investigate the state-of-the-art dimensionality reduction techniques, and find that asymptotically, the optimal strategy coincides with the linear discriminant analysis.
引用
收藏
页码:22 / 41
页数:20
相关论文
共 31 条
[1]  
[Anonymous], 2014, P 3 WORKSH HARDW ARC
[2]  
Archambeau C, 2006, LECT NOTES COMPUT SC, V4249, P1
[3]  
Batina L, 2012, LECT NOTES COMPUT SC, V7178, P383, DOI 10.1007/978-3-642-27954-6_24
[4]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[5]  
Bruneau N, 2014, LECT NOTES COMPUT SC, V8804, P183, DOI 10.1007/978-3-319-12060-7_13
[6]  
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
[7]   Efficient Template Attacks [J].
Choudary, Omar ;
Kuhn, Markus G. .
SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2013), 2014, 8419 :253-270
[8]   Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest [J].
Clavier, Christophe ;
Danger, Jean-Luc ;
Duc, Guillaume ;
Elaabid, M. Abdelaziz ;
Gerard, Benoit ;
Guilley, Sylvain ;
Heuser, Annelie ;
Kasper, Michael ;
Li, Yang ;
Lomne, Victor ;
Nakatsu, Daisuke ;
Ohta, Kazuo ;
Sakiyama, Kazuo ;
Sauvage, Laurent ;
Schindler, Werner ;
Stottinger, Marc ;
Veyrat-Charvillon, Nicolas ;
Walle, Matthieu ;
Wurcker, Antoine .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2014, 4 (04) :259-274
[9]  
Cover Thomas M., 2006, Elements of Information Theory, V2nd
[10]  
Danger J.-L., 2014, P 1 WORKSH CRYPT SEC, V7, P7, DOI [10.1145/2556315.2556316, DOI 10.1145/2556315.2556316]