2009
DOI: 10.1007/978-3-642-04138-9_9
|View full text |Cite
|
Sign up to set email alerts
|

Differential Cluster Analysis

Abstract: Abstract. We propose a new technique called Differential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions and it combines features from previously known collision attacks and Differential Power Analysis. It captures more general leakage features and can be applied to algorithmic collisions as well as implementation specific collisions. In addition, the concept is inherently multivariate. Various applications of the approach are possible:… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 51 publications
(40 citation statements)
references
References 20 publications
0
40
0
Order By: Relevance
“…And this feature has no effect on the conditional entropy and the corresponding mutual information. This is in contrast with correlation attacks, which may still be able to detect a (weak) linear dependence if it exists, but not specific to MIA: most attacks based on leakage partitions suffer from the same limitation [29,33,35]. We note that if an adversary aims to be perfectly generic and to use an identity leakage model, he can always target intermediate variables that do not bijectively depend on the key for a given plaintext.…”
Section: Discussionmentioning
confidence: 98%
See 1 more Smart Citation
“…And this feature has no effect on the conditional entropy and the corresponding mutual information. This is in contrast with correlation attacks, which may still be able to detect a (weak) linear dependence if it exists, but not specific to MIA: most attacks based on leakage partitions suffer from the same limitation [29,33,35]. We note that if an adversary aims to be perfectly generic and to use an identity leakage model, he can always target intermediate variables that do not bijectively depend on the key for a given plaintext.…”
Section: Discussionmentioning
confidence: 98%
“…Several solutions exist, ranging from simple histograms to kernel density estimation, data clustering [35] and vector quantization [31]. The authors of [8] used histograms for density estimation as a proof of concept for MIA.…”
Section: Pdf Estimation Toolsmentioning
confidence: 99%
“…Examining the First-Order Leakage Back to the original correlation-collision attack [29], which is shortly restated later, the authors proposed a variance test approach which can identify the time instances when a first-order leakage is exhibited by the traces. It is worth to mention that relatively-similar approaches were previously introduced in [1,42] as inter cluster separation and variance test. In order to follow this approach we first need to estimate the mean of the traces classified by the plaintext bytes.…”
Section: Discussionmentioning
confidence: 99%
“…Batina et al [1] presented the Differential Cluster Analysis (DCA) against a cryptographic device using an unknown fixed subkey. This technique uses cluster analysis to detect internal collisions in their traces.…”
Section: Overview Of Related Workmentioning
confidence: 99%