2005
DOI: 10.1007/11545262_23
|View full text |Cite
|
Sign up to set email alerts
|

Improved Higher-Order Side-Channel Attacks with FPGA Experiments

Abstract: Abstract. We demonstrate that masking a block cipher implementation does not sufficiently improve its security against side-channel attacks. Under exactly the same hypotheses as in a Differential Power Analysis (DPA), we describe an improvement of the previously introduced higherorder techniques allowing us to defeat masked implementations in a low (i.e. practically tractable) number of measurements. The proposed technique is based on the efficient use of the statistical distributions of the power consumption … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
53
0

Year Published

2006
2006
2016
2016

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 73 publications
(54 citation statements)
references
References 17 publications
0
53
0
Order By: Relevance
“…In the second category, hiding, intermediate values remain the same as for unprotected implementations, but power consumption is made as constant as possible. According to the state-of-the-art attacks, masked implementation on a Field Programmable Gates Array (FPGA) could be broken with Higher-Order Differential Power Analysis (HODPA) using 12,000 power consumption traces [3] whereas 1,500,000 measurements are not sufficient to disclose the entire secret key of an Application Specific Integrated Circuit (ASIC) cryptoprocessor protected by Wave Dynamic Differential Logic (WDDL) [4], the most popular hiding countermeasure developed by Tiri and Verbauwhede. Proposals for merging both techniques with a view to compensate for weakness of masking against HODPA and for backend operations hardness of hiding have been reported in [5,6], but this approach unfortunately remains vulnerable when the masking relies on one single bit of entropy [7].…”
Section: Introductionmentioning
confidence: 99%
“…In the second category, hiding, intermediate values remain the same as for unprotected implementations, but power consumption is made as constant as possible. According to the state-of-the-art attacks, masked implementation on a Field Programmable Gates Array (FPGA) could be broken with Higher-Order Differential Power Analysis (HODPA) using 12,000 power consumption traces [3] whereas 1,500,000 measurements are not sufficient to disclose the entire secret key of an Application Specific Integrated Circuit (ASIC) cryptoprocessor protected by Wave Dynamic Differential Logic (WDDL) [4], the most popular hiding countermeasure developed by Tiri and Verbauwhede. Proposals for merging both techniques with a view to compensate for weakness of masking against HODPA and for backend operations hardness of hiding have been reported in [5,6], but this approach unfortunately remains vulnerable when the masking relies on one single bit of entropy [7].…”
Section: Introductionmentioning
confidence: 99%
“…Application to Variant 1: This variant replaces (12) with (19) in the E-Step and uses solely (14) in the M-Step [7].…”
Section: Application To Variant 4: Each Iteration Includes the Expectmentioning
confidence: 99%
“…It combines measurements at related time instants before statistics is applied. Related work on second-order DPA can also be found in [11,19,17,21,16,1]. Except for [1] these contributions assume that the leakage of the cryptographic device corresponds to the Hamming weight model.…”
Section: Introductionmentioning
confidence: 99%
“…In particular, the shares are usually processed at the same time. As a consequence the instantaneous leakage is actually dependent on the sensitive variables, which makes some dedicated attacks possible [28,19]. Other vulnerabilities come from physical phenomena such as glitches [16] or propagation delays [27].…”
Section: Introductionmentioning
confidence: 99%
“…As a first step, resistance against second order SCA (2O-SCA) is of importance since it has been substantially improved and successfully put into practice [28,19,11,18,17,14].…”
Section: Introductionmentioning
confidence: 99%