A Frequency Leakage Model and its application to CPA and DPA

This paper introduces a leakage model in the frequency domain to enhance the efficiency of Side Channel Attacks of CMOS circuits. While usual techniques are focused on noise removal around clock harmonics, we show that the actual leakage is not necessary located in those expected bandwidths as experimentally observed by E. Mateos and C.H. Gebotys in 2010. We start by building a theoretical modeling of power consumption and electromagnetic emanations before deriving from it a criterion to guide standard attacks. This criterion is then validated on real experiments, both on FPGA and ASIC, that show an impressive increase of the yield of SCA.

[1]  Alexandre Venelli,et al.  Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines , 2010, WISTP.

[2]  Olivier Meynard,et al.  Characterization of the Electromagnetic Side Channel in Frequency Domain , 2010, Inscrypt.

[3]  Christophe Clavier,et al.  Correlation Power Analysis with a Leakage Model , 2004, CHES.

[4]  Satoshi Goto,et al.  Correlated Noise Reduction for Electromagnetic Analysis , 2013, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[5]  Davide Pandini,et al.  Clock Distribution Techniques for Low-EMI Design , 2007, PATMOS.

[6]  S. M. de Jong,et al.  Imaging spectrometry : basic principles and prospective applications , 2001 .

[7]  Aurélien Francillon,et al.  Smart Card Research and Advanced Applications , 2013, Lecture Notes in Computer Science.

[8]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[9]  Sylvain Guilley,et al.  Quantifying the Quality of Side-Channel Acquisitions , 2011 .

[10]  Alessandro Barenghi,et al.  Improving first order differential power attacks through digital signal processing , 2010, SIN.

[11]  Stefan Mangard,et al.  One for all - all for one: unifying standard differential power analysis attacks , 2011, IET Inf. Secur..

[12]  Alessandro Barenghi,et al.  Information Leakage Discovery Techniques to Enhance Secure Chip Design , 2011, WISTP.

[13]  Christof Paar,et al.  Improving Side-Channel Analysis with Optimal Linear Transforms , 2012, CARDIS.

[14]  François-Xavier Standaert,et al.  Univariate side channel attacks and leakage modeling , 2011, Journal of Cryptographic Engineering.

[15]  Catherine H. Gebotys,et al.  EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA , 2005, CHES.

[16]  Thanh-Ha Le,et al.  Mutual Information Analysis under the View of Higher-Order Statistics , 2010, IWSEC.

[17]  W. Rosenstiel,et al.  Correlation power analysis in frequency domain extended abstract , 2010 .

[18]  Moti Yung,et al.  A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..

[19]  Bart Preneel,et al.  Mutual Information Analysis , 2008, CHES.

[20]  Pankaj Rohatgi,et al.  Template Attacks , 2002, CHES.

[21]  Robert H. Sloan,et al.  Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.

[22]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[23]  Philippe Maurine,et al.  SCA with Magnitude Squared Coherence , 2012, CARDIS.

[24]  Jean-Louis Lacoume,et al.  Noise Reduction in Side Channel Attack Using Fourth-Order Cumulant , 2007, IEEE Transactions on Information Forensics and Security.

[25]  Catherine H. Gebotys,et al.  A new correlation frequency analysis of the side channel , 2010, WESS '10.

[26]  Amine Dehbaoui,et al.  Spectral Coherence Analysis - First Experimental Results - , 2011, IACR Cryptol. ePrint Arch..