Filtering-based CPA: a successful side-channel attack against desynchronization countermeasures - Mines Saint-Étienne
Communication Dans Un Congrès Année : 2017

Filtering-based CPA: a successful side-channel attack against desynchronization countermeasures

Résumé

Secure implementations against side channel attacks usually combine hiding and masking protections in software implementations. In this work, we focus on desynchronization protection which is considered as a hiding countermeasure. The idea of desynchronization is to obtain a non-predictable offset of the attacking point in terms of time dimension. For this purpose, we present exploiting pattern-recognition methods to filter interesting points for obtaining a successful side channel attack. Using this tool as a case study, we completely cancel the desynchronization effect of the CHES 2009/2010 countermeasure [2, 3]. Moreover, 25k traces are needed for a successful key recoveries in case of polymorphism-based countermeasure [4].
Fichier principal
Vignette du fichier
Abdellatif2017.pdf (259.33 Ko) Télécharger le fichier
Origine Fichiers éditeurs autorisés sur une archive ouverte

Dates et versions

emse-01490735 , version 1 (18-11-2021)

Licence

Copyright (Tous droits réservés)

Identifiants

Citer

Karim Moussa Ali Abdellatif, Damien Couroussé, Olivier Potin, Philippe Jaillon. Filtering-based CPA: a successful side-channel attack against desynchronization countermeasures. Fourth Workshop on Cryptography and Security in Computing Systems (CS2 '17), Jan 2017, Stockholm, Sweden. pp.29-32, ⟨10.1145/3031836.3031842⟩. ⟨emse-01490735⟩
636 Consultations
179 Téléchargements

Altmetric

Partager

More