Statistical Analysis of Second Order Differential Power Analysis
Top Cited Papers
- 19 January 2009
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Computers
- Vol. 58 (6), 799-811
- https://doi.org/10.1109/tc.2009.15
Abstract
Second order Differential Power Analysis (2O-DPA) is a powerful side-channel attack that allows an attacker to bypass the widely used masking countermeasure. To thwart 2O-DPA, higher order masking may be employed but it implies a nonnegligible overhead. In this context, there is a need to know how efficient a 2O-DPA can be, in order to evaluate the resistance of an implementation that uses first order masking and, possibly, some hardware countermeasures. Different methods of mounting a practical 2O-DPA attack have been proposed in the literature. However, it is not yet clear which of these methods is the most efficient. In this paper, we give a formal description of the higher order DPA that are mounted against software implementations. We then introduce a framework in which the attack efficiencies may be compared. The attacks we focus on involve the combining of several leakage signals and the computation of correlation coefficients to discriminate the wrong key hypotheses. In the second part of this paper, we pay particular attention to 2O-DPA that involves the product combining or the absolute difference combining. We study them under the assumption that the device leaks the Hamming weight of the processed data together with an independent Gaussian noise. After showing a way to improve the product combining, we argue that in this model, the product combining is more efficient not only than absolute difference combining, but also than all the other combining techniques proposed in the literature.This publication has 13 references indexed in Scilit:
- Side Channel Cryptanalysis of a Higher Order Masking SchemeLecture Notes in Computer Science, 2007
- Higher Order Masking of the AESLecture Notes in Computer Science, 2006
- Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block CiphersLecture Notes in Computer Science, 2006
- A Stochastic Model for Differential Side Channel CryptanalysisLecture Notes in Computer Science, 2005
- Improved Higher-Order Side-Channel Attacks with FPGA ExperimentsLecture Notes in Computer Science, 2005
- On Second-Order Differential Power AnalysisLecture Notes in Computer Science, 2005
- Hardware Countermeasures against DPA – A Statistical Analysis of Their EffectivenessLecture Notes in Computer Science, 2004
- An Implementation of DES and AES, Secure against Some AttacksLecture Notes in Computer Science, 2001
- Using Second-Order Power Analysis to Attack DPA Resistant SoftwareLecture Notes in Computer Science, 2000
- Differential Power AnalysisLecture Notes in Computer Science, 1999