Paper 2014/433

A Statistical Model for Higher Order DPA on Masked Devices

A. Adam Ding, Liwei Zhang, Yunsi Fei, and Pei Luo

Abstract

A popular effective countermeasure to protect block cipher implementations against differential power analysis (DPA) attacks is to mask the internal operations of the cryptographic algorithm with random numbers. While the masking technique resists against first-order (univariate) DPA attacks, higher-order (multivariate) attacks were able to break masked devices. In this paper, we formulate a statistical model for higher-order DPA attack. We derive an analytic success rate formula that distinctively shows the effects of algorithmic confusion property, signal-noise-ratio (SNR), and masking on leakage of masked devices. It further provides a formal proof for the centered product combination function being optimal for higher-order attacks in very noisy scenarios. We believe that the statistical model fully reveals how the higher-order attack works around masking, and would offer good insights for embedded system designers to implement masking techniques.

Note: An extended version, over the page limit at CHES2014.

Metadata
Available format(s)
PDF
Publication info
Published by the IACR in CHES 2014
Keywords
Side-channel attackdifferential power analysisstatistical model
Contact author(s)
a ding @ neu edu
History
2014-06-14: revised
2014-06-12: received
See all versions
Short URL
https://ia.cr/2014/433
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/433,
      author = {A.  Adam Ding and Liwei Zhang and Yunsi Fei and Pei Luo},
      title = {A Statistical Model for Higher Order DPA on Masked Devices},
      howpublished = {Cryptology ePrint Archive, Paper 2014/433},
      year = {2014},
      note = {\url{https://eprint.iacr.org/2014/433}},
      url = {https://eprint.iacr.org/2014/433}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.