Cross-Correlation Cartography

Side channel and fault injection attacks are a major threat to cryptographic applications of embedded systems. Best performances for these attacks are achieved by focusing sensors or injectors on the sensible parts of the application, by means of dedicated methods to localise them. Few methods have been proposed in the past, and all of them pinpoint the crypto processor. However, when the cryptographic application is protected, it could be interesting to exploit the activity of other parts of the application, to bypass the countermeasure. In this article, we propose a new localisation method based on cross-correlation, which issues a list of areas of interest within the attacked device. Not only the analysis is exhaustive, but it also does not require a preliminary knowledge about the implementation. Notably, unlike the previous art, this cartography method does not demand that the attacker has the power to request two (or more) acquisitions with anything identical but the crypto processor inputs (\emph{e.g.} the plaintext). The method is experimentally validated using observations of the electromagnetic near field distribution over a Xilinx Virtex 5 FPGA.

[1]  Sylvain Guilley,et al.  Successful attack on an FPGA-based WDDL DES cryptoprocessor without place and route constraints , 2009, 2009 Design, Automation & Test in Europe Conference & Exhibition.

[2]  Eric Peeters,et al.  Improved Higher-Order Side-Channel Attacks with FPGA Experiments , 2005, CHES.

[3]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[4]  Sylvain Guilley,et al.  Electromagnetic Radiations of FPGAs: High Spatial Resolution Cartography and Attack on a Cryptographic Module , 2009, TRETS.

[5]  Bruno Rouzeyre,et al.  When Failure Analysis Meets Side-Channel Attacks , 2010, CHES.

[6]  Louis Goubin,et al.  DES and Differential Power Analysis (The "Duplication" Method) , 1999, CHES.

[7]  Thomas S. Messerges,et al.  Using Second-Order Power Analysis to Attack DPA Resistant Software , 2000, CHES.

[8]  Lionel Torres,et al.  Magnitude squared incoherence EM analysis for integrated cryptographic module localisation , 2009 .

[9]  Denis Réal,et al.  Enhancing correlation electromagnetic attack using planar near-field cartography , 2009, 2009 Design, Automation & Test in Europe Conference & Exhibition.

[10]  Sergei P. Skorobogatov,et al.  Using Optical Emission Analysis for Estimating Contribution to Power Analysis , 2009, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).

[11]  Francis Olivier,et al.  Electromagnetic Analysis: Concrete Results , 2001, CHES.

[12]  Bart Preneel,et al.  Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis. , 2009 .

[13]  Christophe Clavier,et al.  Correlation Power Analysis with a Leakage Model , 2004, CHES.

[14]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[15]  Pankaj Rohatgi,et al.  Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.

[16]  Emmanuel Prouff,et al.  Statistical Analysis of Second Order Differential Power Analysis , 2009, IEEE Transactions on Computers.