2014
DOI: 10.1007/978-3-319-04852-9_10
|View full text |Cite
|
Sign up to set email alerts
|

The Myth of Generic DPA…and the Magic of Learning

Abstract: Abstract. A generic DPA strategy is one which is able to recover secret information from physically observable device leakage without any a priori knowledge about the device's leakage characteristics. Here we provide much-needed clarication on results emerging from the existing literature, demonstrating precisely that such methods (strictly dened) are inherently restricted to a very limited selection of target functions. Continuing to search related techniques for a`silver bullet' generic attack appears a boot… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
65
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 60 publications
(67 citation statements)
references
References 32 publications
2
65
0
Order By: Relevance
“…In particular, we investigate two important directions left open by Piret et al First, we observe that non-bijective S-boxes usually lead to simple non-profiled attacks (as their output directly gives rise to "meaningful leakage models" [59]). As recently shown by Whitnall et al, we even have a proof that generic (non-profiled) SCAs against bijective S-boxes cannot exist [61]. This naturally gives a strong incentive to consider bijective S-boxes in block ciphers that are purposed for masked implementations.…”
Section: Introductionmentioning
confidence: 70%
See 1 more Smart Citation
“…In particular, we investigate two important directions left open by Piret et al First, we observe that non-bijective S-boxes usually lead to simple non-profiled attacks (as their output directly gives rise to "meaningful leakage models" [59]). As recently shown by Whitnall et al, we even have a proof that generic (non-profiled) SCAs against bijective S-boxes cannot exist [61]. This naturally gives a strong incentive to consider bijective S-boxes in block ciphers that are purposed for masked implementations.…”
Section: Introductionmentioning
confidence: 70%
“…As one goal of this paper is to find an adequate trade-off between these conflicting goals, this section briefly summarizes the main cryptographic properties we will consider. As mentioned in introduction, we will focus in bijective S-boxes since (a) non-bijective S-boxes have already been investigated in [47] and (b) non-bijective S-boxes are more exposed to structural attacks [21,52] and also more sensitive to so-called generic (nonprofiled) SCAs [61]. We now recall some tools used for evaluating the resistance of S-boxes against linear, differential and algebraic attacks.…”
Section: A Backgroundmentioning
confidence: 99%
“…The distance between CPA and NICV is, in non-information theoretic attacks (i.e., attacks in the proportional / ordinal scale, as opposed to the nominal scale [37]) similar to the distance between perceived information (PI) and mutual information (MI) [29]. Like CPA, NICV also achieves an asymptotically constant value, once the measurement set has reached a representative sample size.…”
Section: Rationale Of the Nicv Detection Techniquementioning
confidence: 99%
“…Therefore, optimal distinguishers for different scenarios should be tested [91]. Analyses based on the linear regression promise to be both efficient and flexible and should therefore be examined in more detail [181]. Moreover, not only generic, but also profiled attacks, which exploit information about the leakage distribution, should be conducted.…”
Section: Exploring the Full Attack Potentialmentioning
confidence: 99%