Abstract | ||
---|---|---|
In practice, in order to recover the secret key used by a masking device, higher order side channel attacks (HOSCA) are needed. In HOSCA, physical leakages corresponding to the processing of different sensitive intermediate values can be exploited to recover the secret key used by the target device. At ASIACRYPT 2014, Bruneau et al. proposed higher order optimal distinguisher (HOOD) to recover the secret key used by the target device, and they proved that among different styles of HOSCA, HOOD shows the best efficiency in different scenarios. In HOOD, in order to recover the secret key used by the target device, physical leakages at one leakage sample corresponding to the processing of a certain sensitive intermediate value are exploited. However, there exist more than one leakage sample that correspond to the processing of a certain sensitive intermediate value, and physical leakages contained in multiple leakage samples can be exploited to recover the secret key used by the target device. In light of this, we propose multiple leakage samples based HOOD (MLS-HOOD). We note that with MLS-HOOD, physical leakages of the target device can be sufficiently exploited to efficiently recover its secret key. In fact, we will show its advantage over HOOD and another style of HOSCA in both simulated and real scenarios. |
Year | DOI | Venue |
---|---|---|
2018 | 10.1016/j.ins.2018.07.042 | Information Sciences |
Keywords | Field | DocType |
Side channel attacks,Higher order optimal distinguisher,Masking,Multiple leakage samples | Masking (art),Leakage (electronics),Algorithm,Artificial intelligence,Side channel attack,Machine learning,Mathematics | Journal |
Volume | ISSN | Citations |
466 | 0020-0255 | 0 |
PageRank | References | Authors |
0.34 | 10 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Hailong Zhang | 1 | 11 | 7.76 |
YongBin Zhou | 2 | 136 | 27.58 |