Attacking Randomized Exponentiations Using Unsupervised Learning - LIRMM - Laboratoire d’Informatique, de Robotique et de Microélectronique de Montpellier Accéder directement au contenu
Communication Dans Un Congrès Année : 2014

Attacking Randomized Exponentiations Using Unsupervised Learning

Guilherme Perin
  • Fonction : Auteur
Laurent Imbert
Lionel Torres

Résumé

Countermeasures to defeat most of side-channel attacks onexponentiations are based on randomization of processed data. The ex-ponent and the message blinding are particular techniques to thwartsimple, collisions, differential and correlation analyses. Attacks based ona single (trace) execution of exponentiations, like horizontal correlationanalysis and profiled template attacks, have shown to be efficient againstmost of popular countermeasures. In this paper we show how an unsuper-vised learning can explore the remaining leakages caused by conditionalcontrol tests and memory addressing in a RNS-based implementation ofthe RSA. The device under attack is protected with the exponent blind-ing and the leak resistant arithmetic. The developed attack combinesthe leakage of several samples over the segments of the exponentiationin order to recover the entire exponent. We demonstrate how to find thepoints of interest using trace pre-processing and clustering algorithms.This attack can recover the exponent using a single trace.
Fichier principal
Vignette du fichier
cosade2014_camera-ready.pdf (1.11 Mo) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

lirmm-01096039 , version 1 (16-12-2014)

Identifiants

Citer

Guilherme Perin, Laurent Imbert, Lionel Torres, Philippe Maurine. Attacking Randomized Exponentiations Using Unsupervised Learning. COSADE: Constructive Side-Channel Analysis and Secure Design, Apr 2014, Paris, France. pp.144-160, ⟨10.1007/978-3-319-10175-0_11⟩. ⟨lirmm-01096039⟩
289 Consultations
698 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More