Sciweavers

ACNS
2009
Springer

How to Compare Profiled Side-Channel Attacks?

13 years 8 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this scenario, an adversary first uses a device under his control in order to build a good leakage model. Then, he takes advantage of this leakage model to exploit the actual leakages of a similar target device and perform a key recovery. Since such attacks are divided in two phases (namely profiling and online attack), the question of how to best evaluate those two phases arises. In this paper, we take advantage of a recently introduced framework for the analysis of side-channel attacks to tackle this issue. We show that the quality of a profiling phase is nicely captured by an information theoretic metric. By contrast, the effectiveness of the online key recovery phase is better measured with a security metric. As an illustration, we use this methodology to compare the two main techniques for profiled side-channe...
François-Xavier Standaert, François
Added 12 Aug 2010
Updated 12 Aug 2010
Type Conference
Year 2009
Where ACNS
Authors François-Xavier Standaert, François Koeune, Werner Schindler
Comments (0)