Template Attacks

  • Authors:
  • Suresh Chari;Josyula R. Rao;Pankaj Rohatgi

  • Affiliations:
  • -;-;-

  • Venue:
  • CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present template attacks, the strongest form of side channel attack possible in an information theoretic sense. These attacks can break implementations and countermeasures whose security is dependent on the assumption that an adversary cannot obtain more than one or a limited number of side channel samples. They require that an adversary has access to an identical experimental device that he can program to his choosing. The success of these attacks in such constraining situations is due manner in which noise within each sample is handled. In contrast to previous approaches which viewed noise as a hindrance that had to be reduced or eliminated, our approach focuses on precisely modeling noise, and using this to fully extract information present in a single sample. We describe in detail how an implementation of RC4, not amenable to techniques such as SPA and DPA, can easily be broken using template attacks with a single sample. Other applications include attacks on certain DES implementations which use DPA-resistant hardware and certain SSL accelerators which can be attacked by monitoring electromagnetic emanations from an RSA operation even from distances of fifteen feet.