Enhancing Dimensionality Reduction Methods for Side-Channel Attacks

Advanced Side-Channel Analyses make use of dimensionality reduction techniques to reduce both the memory and timing complexity of the attacks. The most popular methods to effectuate such a reduction are the Principal Component Analysis PCA and the Linear Discriminant Analysis LDA. They indeed lead to remarkable efficiency gains but their use in side-channel context also raised some issues. The PCA provides a set of vectors the principal components onto which project the data. The open question is which of these principal components are the most suitable for side-channel attacks. The LDA has been valorized for its theoretical leaning toward the class-distinguishability, but discouraged for its constraining greed of data. In this paper we present an in-depth study of these two methods, and, to automatize and to ameliorate the principal components selection, we propose a new technique named cumulative Explained Local Variance ELV selection. Moreover we present some extensions of the LDA, available in less constrained situations than the classical version. We equip our study with a comprehensive comparison of the existing and new methods in real cases. It allows us to verify the soundness of the ELV selection, and the effectiveness of the methods proposed to extend the use of the LDA to side-channel contexts where the existing approaches are inapplicable.

[1]  Markus G. Kuhn,et al.  Ecient Template Attacks , 2014 .

[2]  Ja-Chen Lin,et al.  A new LDA-based face recognition system which can solve the small sample size problem , 1998, Pattern Recognit..

[3]  Hua Yu,et al.  A direct LDA algorithm for high-dimensional data - with application to face recognition , 2001, Pattern Recognit..

[4]  Keinosuke Fukunaga,et al.  Introduction to statistical pattern recognition (2nd ed.) , 1990 .

[5]  T. Guhr,et al.  RANDOM-MATRIX THEORIES IN QUANTUM PHYSICS : COMMON CONCEPTS , 1997, cond-mat/9707301.

[6]  David J. Kriegman,et al.  Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.

[7]  Markus G. Kuhn,et al.  Efficient Template Attacks , 2013, CARDIS.

[8]  Jing-Yu Yang,et al.  A generalized optimal set of discriminant vectors , 1992, Pattern Recognit..

[9]  R. Fisher THE STATISTICAL UTILIZATION OF MULTIPLE MEASUREMENTS , 1938 .

[10]  Markus G. Kuhn,et al.  Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits , 2014, CARDIS.

[11]  Jasper G. J. van Woudenberg,et al.  Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis , 2012, CT-RSA.

[12]  Elena Marchiori,et al.  PCA, Eigenvector Localization and Clustering for Side-Channel Attacks on Cryptographic Hardware Devices , 2012, ECML/PKDD.

[13]  François-Xavier Standaert,et al.  Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages , 2008, CHES.

[14]  Georg Sigl,et al.  Improving Non-profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-channel High-Resolution EM Measurements , 2015, COSADE.

[15]  Eric Peeters,et al.  Template Attacks in Principal Subspaces , 2006, CHES.

[16]  Simon Regard,et al.  ["Less is more"]. , 2013, Revue medicale suisse.

[17]  Zhizhang Chen,et al.  ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research , 2014, COSADE.

[18]  Sylvain Guilley,et al.  Less is More - Dimensionality Reduction from a Theoretical Perspective , 2015, CHES.

[19]  Noam Nisan,et al.  Randomness is Linear in Space , 1996, J. Comput. Syst. Sci..

[20]  Pankaj Rohatgi,et al.  Template Attacks , 2002, CHES.

[21]  Bart De Moor,et al.  Side channel attacks on cryptographic devices as a classification problem , 2007 .

[22]  Hanqing Lu,et al.  Solving the small sample size problem of LDA , 2002, Object recognition supported by user interaction for service robots.

[23]  Moti Yung,et al.  A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..

[24]  Christof Paar,et al.  Building a Side Channel Based Disassembler , 2010, Trans. Comput. Sci..

[25]  J. Massey Guessing and entropy , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.