Side-Channel Expectation-Maximization Attacks

Block ciphers are protected against side-channel attacks by masking. On one hand, when the leakage model is unknown, second-order correlation attacks are typically used. On the other hand, when the leakage model can be profiled, template attacks are prescribed. But what if the profiled model does n...

Full description

Bibliographic Details
Main Authors: Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2022-08-01
Series:Transactions on Cryptographic Hardware and Embedded Systems
Subjects:
Online Access:https://ojs-dev.ub.rub.de/index.php/TCHES/article/view/9840
_version_ 1797690047872368640
author Julien Béguinot
Wei Cheng
Sylvain Guilley
Olivier Rioul
author_facet Julien Béguinot
Wei Cheng
Sylvain Guilley
Olivier Rioul
author_sort Julien Béguinot
collection DOAJ
description Block ciphers are protected against side-channel attacks by masking. On one hand, when the leakage model is unknown, second-order correlation attacks are typically used. On the other hand, when the leakage model can be profiled, template attacks are prescribed. But what if the profiled model does not exactly match that of the attacked device? One solution consists in regressing on-the-fly the scaling parameters from the model. In this paper, we leverage an Expectation-Maximization (EM) algorithm to implement such an attack. The resulting unprofiled EM attack, termed U-EM, is shown to be both efficient (in terms of number of traces) and effective (computationally speaking). Based on synthetic and real traces, we introduce variants of our U-EM attack to optimize its performance, depending on trade-offs between model complexity and epistemic noise. We show that the approach is flexible, in that it can easily be adapted to refinements such as different points of interest and number of parameters in the leakage model.
first_indexed 2024-03-12T01:53:57Z
format Article
id doaj.art-1d432a83b7c8462d941d4d8dc431a3ac
institution Directory Open Access Journal
issn 2569-2925
language English
last_indexed 2024-03-12T01:53:57Z
publishDate 2022-08-01
publisher Ruhr-Universität Bochum
record_format Article
series Transactions on Cryptographic Hardware and Embedded Systems
spelling doaj.art-1d432a83b7c8462d941d4d8dc431a3ac2023-09-08T07:01:07ZengRuhr-Universität BochumTransactions on Cryptographic Hardware and Embedded Systems2569-29252022-08-012022410.46586/tches.v2022.i4.774-799Side-Channel Expectation-Maximization AttacksJulien Béguinot0Wei Cheng1Sylvain Guilley2Olivier Rioul3LTCI, Télécom Paris, Institut Polytechnique de Paris, Palaiseau, FranceLTCI, Télécom Paris, Institut Polytechnique de Paris, Palaiseau, France; Secure-IC S.A.S., Paris, FranceSecure-IC S.A.S., Paris, France; LTCI, Télécom Paris, Institut Polytechnique de Paris, Palaiseau, FranceLTCI, Télécom Paris, Institut Polytechnique de Paris, Palaiseau, France Block ciphers are protected against side-channel attacks by masking. On one hand, when the leakage model is unknown, second-order correlation attacks are typically used. On the other hand, when the leakage model can be profiled, template attacks are prescribed. But what if the profiled model does not exactly match that of the attacked device? One solution consists in regressing on-the-fly the scaling parameters from the model. In this paper, we leverage an Expectation-Maximization (EM) algorithm to implement such an attack. The resulting unprofiled EM attack, termed U-EM, is shown to be both efficient (in terms of number of traces) and effective (computationally speaking). Based on synthetic and real traces, we introduce variants of our U-EM attack to optimize its performance, depending on trade-offs between model complexity and epistemic noise. We show that the approach is flexible, in that it can easily be adapted to refinements such as different points of interest and number of parameters in the leakage model. https://ojs-dev.ub.rub.de/index.php/TCHES/article/view/9840Side-Channel AnalysisMasked CryptographyMaximum Likelihood DistinguisherLeakage Model RegressionExpectation Maximization (EM)Unprofiled EM (U-EM) Attack
spellingShingle Julien Béguinot
Wei Cheng
Sylvain Guilley
Olivier Rioul
Side-Channel Expectation-Maximization Attacks
Transactions on Cryptographic Hardware and Embedded Systems
Side-Channel Analysis
Masked Cryptography
Maximum Likelihood Distinguisher
Leakage Model Regression
Expectation Maximization (EM)
Unprofiled EM (U-EM) Attack
title Side-Channel Expectation-Maximization Attacks
title_full Side-Channel Expectation-Maximization Attacks
title_fullStr Side-Channel Expectation-Maximization Attacks
title_full_unstemmed Side-Channel Expectation-Maximization Attacks
title_short Side-Channel Expectation-Maximization Attacks
title_sort side channel expectation maximization attacks
topic Side-Channel Analysis
Masked Cryptography
Maximum Likelihood Distinguisher
Leakage Model Regression
Expectation Maximization (EM)
Unprofiled EM (U-EM) Attack
url https://ojs-dev.ub.rub.de/index.php/TCHES/article/view/9840
work_keys_str_mv AT julienbeguinot sidechannelexpectationmaximizationattacks
AT weicheng sidechannelexpectationmaximizationattacks
AT sylvainguilley sidechannelexpectationmaximizationattacks
AT olivierrioul sidechannelexpectationmaximizationattacks