TY - GEN
T1 - Security evaluation of cryptographic modules against profiling attacks
AU - Kim, Yongdae
AU - Homma, Naofumi
AU - Aoki, Takafumi
AU - Choi, Heebong
PY - 2013
Y1 - 2013
N2 - Recently, profiling attacks have been attracting a great deal of attention because of their increasing efficiency. Further investigations are required to determine the potential threats of the profiling attacks. This paper focuses on these attacks. Using hardware and software implementations, we provide a security evaluation of three different types of profiling attacks: template attack, stochastic model attack, and multivariate regression attack. Our experimental results show that multivariate regression attack outperforms other attacks in terms of profiling efficiency and key extraction rates.
AB - Recently, profiling attacks have been attracting a great deal of attention because of their increasing efficiency. Further investigations are required to determine the potential threats of the profiling attacks. This paper focuses on these attacks. Using hardware and software implementations, we provide a security evaluation of three different types of profiling attacks: template attack, stochastic model attack, and multivariate regression attack. Our experimental results show that multivariate regression attack outperforms other attacks in terms of profiling efficiency and key extraction rates.
KW - multivariate regression analysis
KW - power analysis attack
KW - profiling attack
KW - stochastic model attack
KW - template attack
UR - http://www.scopus.com/inward/record.url?scp=84875993691&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84875993691&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-37682-5_27
DO - 10.1007/978-3-642-37682-5_27
M3 - Conference contribution
AN - SCOPUS:84875993691
SN - 9783642376818
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 383
EP - 394
BT - Information Security and Cryptology, ICISC 2012 - 15th International Conference, Revised Selected Papers
T2 - 15th International Conference on Information Security and Cryptology, ICISC 2012
Y2 - 28 November 2012 through 30 November 2012
ER -