1. Side-Channel Expectation-Maximization Attacks
- Author
-
Béguinot, Julien, Cheng, Wei, Guilley, Sylvain, Rioul, Olivier, Département Communications & Electronique (COMELEC), Télécom ParisTech, Communications Numériques (COMNUM), Laboratoire Traitement et Communication de l'Information (LTCI), Institut Mines-Télécom [Paris] (IMT)-Télécom Paris-Institut Mines-Télécom [Paris] (IMT)-Télécom Paris, Institut Polytechnique de Paris (IP Paris), Secure and Safe Hardware (SSH), Secure-IC S.A.S, Institut Mines-Télécom [Paris] (IMT), French national Bank (BPI) 'Securyzr-V' grant (Contract n° DOS0144216/00), ANR-20-CYAL-0007,APRIORI,Objets connectés à haut niveau de confidentialité avec des implémentations matérielles robustes.(2020), and European Project: 830892,SPARTA(2019)
- Subjects
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,Artificial Intelligence ,Computer Networks and Communications ,Hardware and Architecture ,Signal Processing ,Computer Graphics and Computer-Aided Design ,Software - Abstract
International audience; Block ciphers are protected against side-channel attacks by masking. On one hand, when the leakage model is unknown, second-order correlation attacks are typically used. On the other hand, when the leakage model can be profiled, template attacks are prescribed. But what if the profiled model does not exactly match that of the attacked device? One solution consists in regressing on-the-fly the scaling parameters from the model. In this paper, we leverage an Expectation-Maximization (EM) algorithm to implement such an attack. The resulting unprofiled EM attack, termed U-EM, is shown to be both efficient (in terms of number of traces) and effective (computationally speaking). Based on synthetic and real traces, we introduce variants of our U-EM attack to optimize its performance, depending on trade-offs between model complexity and epistemic noise. We show that the approach is flexible, in that it can easily be adapted to refinements such as different points of interest and number of parameters in the leakage model.
- Published
- 2022
- Full Text
- View/download PDF