Advertisement

Spectral Approach for Correlation Power Analysis

  • Philippe Guillot
  • Gilles Millérioux
  • Brandon DravieEmail author
  • Nadia El Mrabet
Conference paper
  • 662 Downloads
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10194)

Abstract

This paper provides a new approach to perform Correlation Power Analysis (CPA) attack. Power analysis attacks are side channel attacks based on power consumption measures on a device running a cryptographic algorithm with a CMOS technology based circuitry. Unlike most of CPA attacks that are based on statistical attacks, this paper proposes a new approach based on spectral analysis. The interest lies in the reduction of the attack complexity. The complexity is quasi linear in the size of the table of values of the S-box whereas it is quadratic with statistical attacks. It is shown that it can be easily extended to a so-called multidimensional attack. The attack is experimented on a AES S-box.

Keywords

Correlation Power Analysis Spectral analysis Fourier transform 

Notes

Acknowledgments

This work was supported by the Research Grants THE CASCADE ANR-13-INSE-0005-01 from the Agence Nationale de la Recherche and PEPS SISC ECHARPE 2016 from the Centre National de la Recherche Scientifique, France.

References

  1. 1.
    Aes, N.: Fips publication 197 - advanced encryption standardGoogle Scholar
  2. 2.
    Baker, R.J.: CMOS: Circuit Design, Layout, and Simulation. Wiley, Hoboken (2011)Google Scholar
  3. 3.
    Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004). doi: 10.1007/978-3-540-28632-5_2 CrossRefGoogle Scholar
  4. 4.
    Carlet, C.: Boolean functions for cryptography and error-correcting codes. In: Boolean Models and Methods in Mathematics, Computer Science, and Engineering. Cambridge Press, Cambridge (2010)Google Scholar
  5. 5.
    Des, N.: Fips publication 46–3 - data encryption standardGoogle Scholar
  6. 6.
    Itoh, K., Yajima, J., Takenaka, M., Torii, N.: DPA countermeasures by improving the window method. In: Kaliski, B.S., Koç, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 303–317. Springer, Heidelberg (2003). doi: 10.1007/3-540-36400-5_23 CrossRefGoogle Scholar
  7. 7.
    Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999). doi: 10.1007/3-540-48405-1_25 CrossRefGoogle Scholar
  8. 8.
    Mamiya, H., Miyaji, A., Morimoto, H.: Efficient countermeasures against RPA, DPA, and SPA. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 343–356. Springer, Heidelberg (2004). doi: 10.1007/978-3-540-28632-5_25 CrossRefGoogle Scholar
  9. 9.
    Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)Google Scholar
  10. 10.
    Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541–552 (2002). doi: 10.1109/TC.2002.1004593 MathSciNetCrossRefGoogle Scholar
  11. 11.
    Moradi, A., Poschmann, A.: Lightweight cryptography and DPA countermeasures: a survey. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010. LNCS, vol. 6054, pp. 68–79. Springer, Heidelberg (2010). doi: 10.1007/978-3-642-14992-4_7 CrossRefGoogle Scholar
  12. 12.
    Prouff, E. (ed.): Constructive Side-Channel Analysis and Secure Design - 4th International Workshop, COSADE 2013, Paris, France, 6–8 March 2013. LNCS, vol. 7864. Springer, Heidelberg (2013). doi: 10.1007/978-3-642-40026-1
  13. 13.
    Schimmel, O., Duplys, P., Bohl, E., Hayek, J., Rosenstiel, W.: Correlation power analysis in frequency domain (2010)Google Scholar
  14. 14.
    Tillich, S., Herbst, C.: Attacking state-of-the-art software countermeasures-a case study for AES. In: Proceedings of 10th International Workshop Cryptographic Hardware and Embedded Systems - CHES 2008, Washington, D.C., USA, 10–13 August 2008, pp. 228–243 (2008). doi: 10.1007/978-3-540-85053-3_15

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Philippe Guillot
    • 1
  • Gilles Millérioux
    • 2
    • 3
  • Brandon Dravie
    • 2
    • 3
    Email author
  • Nadia El Mrabet
    • 4
  1. 1.Université Paris 8, LAGA, UMR 7539Saint-DenisFrance
  2. 2.Université de Lorraine, CRAN, UMR 7039, ESSTINVandœuvre-lès-NancyFrance
  3. 3.CNRS, CRAN, UMR 7039Vandoeuvre-lès-NancyFrance
  4. 4.Ecole des Mines de Saint Etienne, SASGardanneFrance

Personalised recommendations