Improved Filtering Techniques for Single- and Multi-Trace Side-Channel Analysis

Side-channel analysis (SCA) attacks constantly improve and evolve. Implementations are therefore designed to withstand strong SCA adversaries. Different side channels exhibit varying statistical characteristics of the sensed or exfiltrated leakage, as well as the embedding of different countermeasures. This makes it crucial to improve and adapt pre-processing and denoising techniques, and abilities to evaluate the adversarial best-case scenario. We address two popular SCA scenarios: (1) a single-trace context, modeling an adversary that captures only one leakage trace, and (2) a multi-trace (or statistical) scenario, that models the classical SCA context. Given that horizontal attacks, localized electromagnetic attacks and remote-SCA attacks are becoming evermore powerful, both scenarios are of interest and importance. In the single-trace context, we improve on existing Singular Spectral Analysis (SSA) based techniques by utilizing spectral property variations over time that stem from the cryptographic implementation. By adapting overlapped-SSA and optimizing over the method parameters, we achieve a significantly shorter computation time, which is the main challenge of the SSA-based technique, and a higher information gain (in terms of the Signal-to-Noise Ratio (SNR)). In the multi-trace context, a profiling strategy is proposed to optimize a Band-Pass Filter (BPF) based on a low-computational cost criterion, which is shown to be efficient for unprotected and low protection level countermeasures. In addition, a slightly more computationally intensive optimized ‘shaped’ filter is presented that utilizes a frequency-domain SNR-based coefficient thresholding. Our experimental results exhibit significant improvements over a set of various implementations embedded with countermeasures in hardware and software platforms, corresponding to varying baseline SNR levels and statistical leakage characteristics.

[1]  Christof Paar,et al.  Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World , 2011, CHES.

[2]  Martin Feldhofer,et al.  On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices , 2009, WISA.

[3]  Romain Poussier,et al.  On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT - A Performance Evaluation Study over Kyber and Dilithium on the ARM Cortex-M4 , 2020, IACR Cryptol. ePrint Arch..

[4]  Stefan Mangard,et al.  Hardware Countermeasures against DPA ? A Statistical Analysis of Their Effectiveness , 2004, CT-RSA.

[5]  François-Xavier Standaert,et al.  Blind Source Separation from Single Measurements Using Singular Spectrum Analysis , 2015, CHES.

[6]  N. Bigdeli,et al.  Data analysis and short term load forecasting in Iran electricity market using singular spectral analysis (SSA) , 2011 .

[7]  Baoxin Hu,et al.  Noise reduction of hyperspectral data using singular spectral analysis , 2009 .

[8]  Masashi Hayakawa,et al.  Singular spectral analysis and principal component analysis for signal discrimination of ULF geomagnetic data associated with 2000 Izu Island Earthquake Swarm , 2006 .

[9]  Pankaj Rohatgi,et al.  Template Attacks , 2002, CHES.

[10]  Begül Bilgin,et al.  Low AND Depth and Efficient Inverses: a Guide on S-boxes for Low-latency Masking , 2020 .

[11]  João Sansão,et al.  A new algorithm in singular spectrum analysis framework: The Overlap-SSA (ov-SSA) , 2018, SoftwareX.

[12]  François-Xavier Standaert,et al.  Beyond algorithmic noise or how to shuffle parallel implementations? , 2020, Int. J. Hum. Cap. Inf. Technol. Prof..

[13]  Alan R. Jones,et al.  Fast Fourier Transform , 1970, SIGP.

[14]  Ying Zhao,et al.  The incorrect usage of singular spectral analysis and discrete wavelet transform in hybrid models to predict hydrological time series , 2017 .

[15]  Bart Preneel,et al.  Mutual Information Analysis , 2008, CHES.

[16]  Joos Vandewalle,et al.  Machine learning in side-channel analysis: a first study , 2011, Journal of Cryptographic Engineering.