CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
Silicon-level Solutions to Counteract Passive and Active Attacks
FDTC '08 Proceedings of the 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography
Information Security and Cryptology --- ICISC 2008
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Differential power analysis enhancement with statistical preprocessing
Proceedings of the Conference on Design, Automation and Test in Europe
High-resolution side-channel attack using phase-based waveform matching
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
A stochastic model for differential side channel cryptanalysis
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Success through confidence: evaluating the effectiveness of a side-channel attack
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
Hi-index | 0.00 |
In this paper we present the "Rank Corrector"(RC), an empirical approach aiming at enhancing most Side Channel Attack (SCA). We show that during an SCA on a cryptographic algorithm like the Data Encryption Standard (DES), the rank of the secret key displays a specific behaviour with regards to other hypotheses. Hence the Rank Corrector algorithm is devised, in order to improve existing SCAs by exploiting such behaviours. With a profiling phase on a clone device, we precisely evaluate the set of parameters that ensure the adaptability of RC to a large range of cryptographic systems, and the possibility to discriminate the secret key from other hypotheses in an efficient manner. The main principle of RC is to detect and discard the false keys hypotheses when analysing the ranking evolution. This results in improving the rank of the secret key, thus accelerating the attack. The efficiency of our algorithm is assessed by performing a Differential Power Analysis (DPA) with and without the rank corrector. We observe a gain of at least 15% on the "Measurements To Disclosure" (MTD) criteria.