Updated recommendations for blinded exponentiation vs. single trace analysis

  • Authors:
  • Christophe Clavier;Benoit Feix

  • Affiliations:
  • XLIM-CNRS, Université de Limoges, Limoges, France;XLIM-CNRS, Université de Limoges, Limoges, France,UK Security Lab, UL Transactions, UK

  • Venue:
  • COSADE'13 Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Side-channel analysis has become a very powerful tool helpful for attackers trying to recover the secrets embedded in microprocessors such as smartcards. Since the initial publications from Kocher et al. many improvements on side-channel techniques have been proposed. At the same time developers have designed countermeasures to counterfeit those threats. The challenge for securing smart devices remains rough. The most complex techniques like Differential, Correlation and Mutual-information analysis are more studied today than simple side-channel analysis which seems less considered as said less powerful. We revisit in this paper the simple side-channel analysis attacks previously published. Relying on previous leakage models we design two new methods to build chosen message which allows more efficient analysis on blinded exponentiation. We also show that, contrarily to common belief, with our chosen message method simple side-channel analysis can be successful also in some hashed message models. In a second step we introduce a more precise but realistic leakage model for hardware multipliers which leads us to new results on simple side-channel efficiency. Relying on these models we show that even with big base multipliers leakages can be exploited to recover the secret exponent on blinded exponentiations.