Filtering-based CPA: a successful side-channel attack against desynchronization countermeasures - Mines Saint-Étienne
Conference Papers Year : 2017

Filtering-based CPA: a successful side-channel attack against desynchronization countermeasures

Abstract

Secure implementations against side channel attacks usually combine hiding and masking protections in software implementations. In this work, we focus on desynchronization protection which is considered as a hiding countermeasure. The idea of desynchronization is to obtain a non-predictable offset of the attacking point in terms of time dimension. For this purpose, we present exploiting pattern-recognition methods to filter interesting points for obtaining a successful side channel attack. Using this tool as a case study, we completely cancel the desynchronization effect of the CHES 2009/2010 countermeasure [2, 3]. Moreover, 25k traces are needed for a successful key recoveries in case of polymorphism-based countermeasure [4].
Fichier principal
Vignette du fichier
Abdellatif2017.pdf (259.33 Ko) Télécharger le fichier
Origin Publisher files allowed on an open archive

Dates and versions

emse-01490735 , version 1 (18-11-2021)

Licence

Copyright

Identifiers

Cite

Karim Moussa Ali Abdellatif, Damien Couroussé, Olivier Potin, Philippe Jaillon. Filtering-based CPA: a successful side-channel attack against desynchronization countermeasures. Fourth Workshop on Cryptography and Security in Computing Systems (CS2 '17), Jan 2017, Stockholm, Sweden. pp.29-32, ⟨10.1145/3031836.3031842⟩. ⟨emse-01490735⟩
586 View
166 Download

Altmetric

Share

More