Improved Blind Side-Channel Analysis by Exploitation of Joint Distributions of Leakages
Christophe Clavier, L´ eo Reynaud
Universit´ e de Limoges - XLIM
Improved Blind Side-Channel Analysis by Exploitation of Joint - - PowerPoint PPT Presentation
Improved Blind Side-Channel Analysis by Exploitation of Joint Distributions of Leakages Christophe Clavier, L eo Reynaud Universit e de Limoges - XLIM Introduction Joint distributions and maximum of likelihood Extension to masked
Universit´ e de Limoges - XLIM
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
1
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
guess
known
predicted
2
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
guess
known
predicted
2
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
ATC high ATC low
0x00 0x00 ... 0x00
3
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
4
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
4
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
5
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
6
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
6
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
6
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
7
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
8
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
9
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
8
28
8
28
Leakages
N∗C 0
8
28 N∗C 1
8
28 N∗C 2
8
28
. . . HW = 0 HW = 1 HW = 2
10
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
11
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
11
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
11
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
2
PoI
11
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
2
PoI
11
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
2
α
PoI
11
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
m + ωm
y + ωy
m, h∗ y : correct HW (integer)
Pr((hm,hy))
h∗
m,h∗ y
m, h∗ y)) · Pr((h∗ m, h∗ y)|k)
m, h∗ y)) = Pr(ωm = hm − h∗ m) · Pr(ωy = hy − h∗ y) 12
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
13
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
20 40 60 80 100 120 500 1000 1500 2000 Correct key rank Number of observations m-y σ=0.7 m-y σ=1.0 m-y σ=1.5 m-x-y σ=0.7 m-x-y σ=1.0 m-x-y σ=1.5
0.5 1 1.5 2 100 200 300 400 500 Rank of HW of the correct key Number of observations m-x σ=0.7 m-x σ=1.0 m-x σ=1.5
14
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
15
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
16
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
17
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
18
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
19
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
20
Introduction Joint distributions and maximum of likelihood Extension to masked implementations Conclusion
21