On the optimality of correlation power attack on embedded cryptographic systems

  • Authors:
  • Youssef Souissi;Nicolas Debande;Sami Mekki;Sylvain Guilley;Ali Maalaoui;Jean-Luc Danger

  • Affiliations:
  • TELECOM ParisTech, Paris, France;TELECOM ParisTech, Paris, France,Morpho, Osny, France;TELECOM ParisTech, Paris, France;TELECOM ParisTech, Paris, France;Rutgers University, NJ;TELECOM ParisTech, Paris, France

  • Venue:
  • WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we answer the question of what are the necessary conditions under which Correlation Power Attack (CPA), that essentially targets embedded cryptographic implementations, is optimal with regards to attacks that exploit the same leakage model. For this purpose, we offer an in-depth theoretical study which aims at determining the conditions under which the Pearson correlation coefficient is maximized. Moreover, we propose theoretical metrics to practically verify the validity of those conditions. Besides, we illustrate our theoretical study by an experiment on real electromagnetic traces acquired from a DES cryptographic implementation.