TY - GEN
T1 - On the relationship between correlation power analysis and the stochastic approach
T2 - 14th International Conference on Cryptology in India, INDOCRYPT 2013
AU - De Santis, Fabrizio
AU - Kasper, Michael
AU - Mangard, Stefan
AU - Sigl, Georg
AU - Stein, Oliver
AU - Stöttinger, Marc
PY - 2013
Y1 - 2013
N2 - The design and the security verification of side-channel resistant cryptographic hardware often represent an iterative process. This process essentially consists of a detection phase (), where the information leakage is identified and a correction phase (), where design flaws are corrected. Correlation Power Analysis (CPA) and the Stochastic Approach (SA) are two candidate tools to perform the and to support designers in the. However, until now, the relationship between these two tools has not been discussed yet and it is uncertain from a designer point of view, what informative feedback can be gained from these methods, especially when it comes to evaluate high-dimensional leakage models. In this work, we investigate the relationship between CPA and the SA from both a mathematical and empirical point of view. In particular, we demonstrate that the informative feedback provided by the SA is transferable to a linear combination of CPA attacks and discuss the implications of this entanglement, when it comes to pinpoint the high-dimensional leakage of simulated leakage data and simulated power traces of an ASIC implementation of Present.
AB - The design and the security verification of side-channel resistant cryptographic hardware often represent an iterative process. This process essentially consists of a detection phase (), where the information leakage is identified and a correction phase (), where design flaws are corrected. Correlation Power Analysis (CPA) and the Stochastic Approach (SA) are two candidate tools to perform the and to support designers in the. However, until now, the relationship between these two tools has not been discussed yet and it is uncertain from a designer point of view, what informative feedback can be gained from these methods, especially when it comes to evaluate high-dimensional leakage models. In this work, we investigate the relationship between CPA and the SA from both a mathematical and empirical point of view. In particular, we demonstrate that the informative feedback provided by the SA is transferable to a linear combination of CPA attacks and discuss the implications of this entanglement, when it comes to pinpoint the high-dimensional leakage of simulated leakage data and simulated power traces of an ASIC implementation of Present.
UR - http://www.scopus.com/inward/record.url?scp=84893189866&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-03515-4_14
DO - 10.1007/978-3-319-03515-4_14
M3 - Conference contribution
AN - SCOPUS:84893189866
SN - 9783319035147
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 215
EP - 226
BT - Progress in Cryptology, INDOCRYPT 2013 - 14th International Conference on Cryptology in India, Proceedings
PB - Springer Verlag
Y2 - 7 December 2013 through 10 December 2013
ER -