Attacking Randomized Exponentiations Using Unsupervised Learning - LIRMM - Laboratoire d’Informatique, de Robotique et de Microélectronique de Montpellier Access content directly
Conference Papers Year : 2014

Attacking Randomized Exponentiations Using Unsupervised Learning

Guilherme Perin
  • Function : Author
Laurent Imbert
Lionel Torres


Countermeasures to defeat most of side-channel attacks onexponentiations are based on randomization of processed data. The ex-ponent and the message blinding are particular techniques to thwartsimple, collisions, differential and correlation analyses. Attacks based ona single (trace) execution of exponentiations, like horizontal correlationanalysis and profiled template attacks, have shown to be efficient againstmost of popular countermeasures. In this paper we show how an unsuper-vised learning can explore the remaining leakages caused by conditionalcontrol tests and memory addressing in a RNS-based implementation ofthe RSA. The device under attack is protected with the exponent blind-ing and the leak resistant arithmetic. The developed attack combinesthe leakage of several samples over the segments of the exponentiationin order to recover the entire exponent. We demonstrate how to find thepoints of interest using trace pre-processing and clustering algorithms.This attack can recover the exponent using a single trace.
Fichier principal
Vignette du fichier
cosade2014_camera-ready.pdf (1.11 Mo) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

lirmm-01096039 , version 1 (16-12-2014)



Guilherme Perin, Laurent Imbert, Lionel Torres, Philippe Maurine. Attacking Randomized Exponentiations Using Unsupervised Learning. COSADE: Constructive Side-Channel Analysis and Secure Design, Apr 2014, Paris, France. pp.144-160, ⟨10.1007/978-3-319-10175-0_11⟩. ⟨lirmm-01096039⟩
289 View
707 Download



Gmail Facebook X LinkedIn More