Abstract
In this paper, we answer the question of what are the necessary conditions under which Correlation Power Attack (CPA), that essentially targets embedded cryptographic implementations, is optimal with regards to attacks that exploit the same leakage model. For this purpose, we offer an in-depth theoretical study which aims at determining the conditions under which the Pearson correlation coefficient is maximized. Moreover, we propose theoretical metrics to practically verify the validity of those conditions. Besides, we illustrate our theoretical study by an experiment on real electromagnetic traces acquired from a DES cryptographic implementation.
This project is partially funded by the JST/ANR SPACES project.
Chapter PDF
References
Doget, J., Prouff, E., Rivain, M., Standaert, F.X.: Univariate side channel attacks and leakage modeling. Journal of Cryptographic Engineering 1, 123–144 (2011)
Messerges, T.S.: Using Second-Order Power Analysis to Attack DPA Resistant Software. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 238–251. Springer, Heidelberg (2000)
Mendel, J.: Lessons in Estimation Theory for Signal Processing, Communications, and Control. Pearson Education (1995)
Kamen, E., Su, J.: Introduction to optimal estimation. Advanced textbooks in control and signal processing. Springer (1999)
Candy, J.: Bayesian Signal Processing: Classical, Modern and Particle Filtering Methods. Adaptive and Learning Systems for Signal Processing, Communications and Control Series. John Wiley & Sons (2011)
Anderson, S.: Statistical methods for comparative studies: techniques for bias reduction. Wiley series in probability and mathematical statistics: Applied probability and statistics. Wiley (1980)
Edward, W., Kamen, J.S.: Introduction to optimal estimation Advanced textbooks in control and signal processing Control and Signal Processing Series. Springer (1999)
Bar-Shalom, Y., Li, X., Kirubarajan, T.: Estimation with applications to tracking and navigation. A Wiley-Interscience Publication. Wiley (2001)
Bos, A.: Parameter estimation for scientists and engineers. Wiley-Interscience (2007)
Sorensen, D., Gianola, D.: Likelihood, Bayesian and MCMC methods in quantitative genetics. Statistics for biology and health. Springer (2002)
Sharma, A., Prakash, M.: Linear Transformation. Discovery Publishing House (2007)
Saporta, G.: Data mining et statistique décisionnelle. L’intelligence des données. Technip (2010)
Proakis, J., Salehi, M.: Digital communications. McGraw-Hill higher education. McGraw-Hill (2008)
Arnold, B., Castillo, E., Sarabia, J.: Conditional specification of statistical models. Springer series in statistics. Springer (1999)
Guilley, S.: Documentation technique de la conception physique (ou back-end) du circuit SECMAT (2006), http://perso.telecom-paristech.fr/~guilley/backend.pdf
Guilley, S.: Geometrical Counter-Measures against Side-Channel Attacks. PhD thesis, ENST / CNRS LTCI, 219 pages, Id: 2007 E 003 (2007), http://pastel.paristech.org/2562/
Russo, R.: Statistics for the behavioural sciences: an introduction. Psychology Press (2003)
Rosner, B.: Fundamentals of biostatistics. Brooks/Cole Cengage Learning (2010)
Batina, L., Gierlichs, B., Lemke-Rust, K.: Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 341–354. Springer, Heidelberg (2008)
Standaert, F.-X., Malkin, T.G., Yung, M.: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443–461. Springer, Heidelberg (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Souissi, Y., Debande, N., Mekki, S., Guilley, S., Maalaoui, A., Danger, JL. (2012). On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems. In: Askoxylakis, I., Pöhls, H.C., Posegga, J. (eds) Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems. WISTP 2012. Lecture Notes in Computer Science, vol 7322. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30955-7_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-30955-7_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30954-0
Online ISBN: 978-3-642-30955-7
eBook Packages: Computer ScienceComputer Science (R0)