4.3 Article

One for all - all for one: unifying standard differential power analysis attacks

期刊

IET INFORMATION SECURITY
卷 5, 期 2, 页码 100-110

出版社

INST ENGINEERING TECHNOLOGY-IET
DOI: 10.1049/iet-ifs.2010.0096

关键词

-

资金

  1. EPSRC [F039638, I005226]
  2. Belgian Fund for Scientific Research (FNRS - F.R.S.)
  3. EPSRC [EP/I005226/1] Funding Source: UKRI
  4. Engineering and Physical Sciences Research Council [EP/F039638/1, EP/I005226/1] Funding Source: researchfish

向作者/读者索取更多资源

In this study, the authors examine the relationship between and the efficiency of different approaches to standard (univariate) differential power analysis (DPA) attacks. The authors first show that, when fed with the same assumptions about the target device (i.e. with the same leakage model), the most popular approaches such as using a distance-of-means test, correlation analysis and Bayes attacks are essentially equivalent in this setting. Differences observed in practice are not because of differences in the statistical tests but because of statistical artefacts. Then, the authors establish a link between the correlation coefficient and the conditional entropy in side-channel attacks. In a first-order attack scenario, this relationship allows linking currently used metrics to evaluate standard DPA attacks (such as the number of power traces needed to perform a key recovery) with an information theoretic metric (the mutual information). The authors results show that in the practical scenario defined formally in this study, both measures are equally suitable to compare devices with respect to their susceptibility to DPA attacks. Together with observations regarding key and algorithm independence the authors consequently extend theoretical strategies for the sound evaluation of leaking devices towards the practice of side-channel attacks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.3
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据