Exploiting the Difference of Side-Channel Leakages
In this paper, we propose a setup that improves the performance of implementation attacks by exploiting the difference of side-channel leakages. The main idea of our setup is to use two cryptographic devices and to measure the difference of their physical leakages, e.g., their power consumption. This increases the signal-to-noise ratio of the measurement and reduces the number of needed power-consumption traces in order to succeed an attack. The setup can efficiently be applied (but is not limited) in scenarios where two synchronous devices are available for analysis. By applying template-based attacks, only a few power traces are required to successfully identify weak but data-dependent leakage differences. In order to quantify the efficiency of our proposed setup, we performed practical experiments by designing three evaluation boards that assemble different cryptographic implementations. The results of our investigations show that the needed number of traces can be reduced up to 90%.
KeywordsSide-Channel Attacks Power Analysis Measurement Setup DPA SPA
Unable to display preview. Download preview PDF.
- 4.Brightsight. Unique Tools from the Security Lab, http://www.brightsight.com/documents/marcom-materials/Brightsight_Tools.pdf
- 6.Cryptography Research. DPA Workstation, http://www.cryptography.com/technology/dpa-workstation.html
- 7.den Hartog, J., Verschuren, de Vink, E., de Vos, J., Wiersma, W.: PINPAS: A Tool for Power Analysis of Smartcards. In: Sec 2003, pp. 453–457 (2003)Google Scholar
- 8.International Organisation for Standardization (ISO). ISO/IEC 10373-6: Identification cards - Test methods – Part 6: Proximity cards (2001)Google Scholar
- 9.International Organisation for Standardization (ISO). ISO/IEC 10373-7: Identification cards - Test methods – Part 7: Vicinity cards (2001)Google Scholar
- 10.Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)Google Scholar
- 11.Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)Google Scholar
- 12.Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks – Revealing the Secrets of Smart Cards. Springer (2007) ISBN 978-0-387-30857-9Google Scholar
- 13.Matsumoto, T., Kawamura, S., Fujisaki, K., Torii, N., Ishida, S., Tsunoo, Y., Saeki, M., Yamagishi, A.: Tamper-resistance standardization research committee report. In: The 2006 Symposium on Cryptography and Information Security (2006)Google Scholar
- 16.Riscure. Inspector - The Side-Channel Test Tool, http://www.riscure.com/fileadmin/images/Docs/Inspector_brochure.pdf
- 17.Side-channel attack standard evaluation board. The SASEBO Website, http://www.rcis.aist.go.jp/special/SASEBO/
- 18.The Mathworks. MATLAB - The Language of Technical Computing, http://www.mathworks.com/products/matlab/