FAN Guangjun, ZHOU Yongbin, ZHANG Hailong, et al., “The Cognition Is Not Enough: Another Look on Existing Interesting Points Chosen Methods,” Chinese Journal of Electronics, vol. 26, no. 2, pp. 416-423, 2017, doi: 10.1049/cje.2017.01.030
Citation: FAN Guangjun, ZHOU Yongbin, ZHANG Hailong, et al., “The Cognition Is Not Enough: Another Look on Existing Interesting Points Chosen Methods,” Chinese Journal of Electronics, vol. 26, no. 2, pp. 416-423, 2017, doi: 10.1049/cje.2017.01.030

The Cognition Is Not Enough: Another Look on Existing Interesting Points Chosen Methods

doi: 10.1049/cje.2017.01.030
Funds:  This work is supported by the National Natural Science Foundation of China (No.91118006), the National Natural Science Foundation of China (No.61472416, No.61272478), and the National Key Scientific and Technological Project (No.2014ZX01032401-001).
  • Received Date: 2015-01-05
  • Rev Recd Date: 2015-03-10
  • Publish Date: 2017-03-10
  • For classical template attacks, many papers suggested a guideline of choosing interesting points which is still not proven. Up to now, many different methods of choosing interesting points were introduced. However, it is still unclear that which approach will lead to the best classification performance for template attacks. We comprehensively evaluate and compare the classification performance of template attacks when using different methods of choosing interesting points. Evaluation results show that the Correlation power analysis based method and the Sum of squared pairwise t-differences based method will lead to the best classification performance. We find that some methods of choosing interesting points provide the same results in the same circumstance. Finally, we correctly prove the guideline of choosing interesting points is correct by presenting a new way of conducting template attacks.
  • loading
  • S. Chari, J.R. Rao and P. Rohatgi, "Template attacks", Workshop on Cryptographic Hardware and Embedded Systems, Redwood City, USA, pp.13-28, 2002.
    C. Rechberger and E. Oswald, "Practical template attacks", International Workshop on Information Security Applications, Jeju Island, Korea, pp.440-456, 2004.
    C. Archambeau, E. Peeters, F.-X. Standaert and J.-J. Quisquater, "Template attacks in principal subspaces", Workshop on Cryptographic Hardware and Embedded Systems, Yokohama, Japan, pp.1-14, 2006.
    N. Hanley, M. Tunstall and W.P. Marnane, "Unknown plaintext template attacks", International Workshop on Information Security Applications, Jeju Island, Korea, pp.148-162, 2009.
    B. Gierlichs, K. Lemke-Rust and C. Paar, "Templates vs. stochastic methods a performance analysis for side channel cryptanalysis", Workshop on Cryptographic Hardware and Embedded Systems, Yokohama, Japan, pp.15-29, 2006.
    S. Mangard, E. Oswald and T. Popp, Power Analysis Attacks:Revealing the Secrets of Smart Cards, Springer US, US, 2007.
    L. Mather, E. Oswald, J. Bandenburg and M. Wójcik, "Does my device leak information? An a priori statistical power analysis of leakage detection tests", Asiacrypt, Bengaluru, India, pp.486-505, 2013.
    B. Gierlichs, L. Batina, P. Tuyls and B. Preneel, "Mutual information analysis", Workshop on Cryptographic Hardware and Embedded Systems, Washington, DC, USA, pp.426-442, 2008.
    C. Whitnall, E. Oswald and L. Mather, "An exploration of the Kolmogorov-Smirnov test as a competitor to mutual information analysis", Smart Card Research and Advanced Application Conference, Passau, Germany, pp.234-251, 2011.
    O. Choudary and M.G. Kuhn, "Efficient template attacks", Smart Card Research and Advanced Application Conference, Berlin, Germany, pp.253-270, 2013.
    E. Oswald and S. Mangard, "Template attacks on masking-resistance is futile", The Cryptographers' Track at the RSA Conference, pp.243-256, 2007.
    D.P. Montminy, R.O. Baldwin, M.A. Temple and E.D. Laspe, "Improving cross-device attacks using zero-mean unit-variance normalization", Journal of Cryptographic Engineering, Vol.3, No.2, pp.99-110, 2013.
    W. Schindler, K. Lemke and C. Paar, "A stochastic model for differential side channel cryptanalysis", Workshop on Cryptographic Hardware and Embedded Systems, Edinburgh, UK, pp.30-46, 2005.
    F.-X. Standaert and C. Archambeau, "Using subspace-based template attacks to compare and combine power and electromagnetic information leakages", Workshop on Cryptographic Hardware and Embedded Systems, Washington, DC, USA, pp.411-425, 2008.
    I. Jolliffe, Principal Component Analysis, Wiley, Chichester, UK, 2005.
    F.-X. Standaert, T.G. Malkin and M. Yung, "A unified framework for the analysis of side-channel key recovery attacks", Eurocrypt, Cologne, Germany, pp.443-461, 2009.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (454) PDF downloads(420) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return