Leakage Assessment Methodology
- a clear roadmap for side-channel evaluations -
- 29. August 2015
Tobias Schneider & Amir Moradi
Ruhr-Universität Bochum
Leakage Assessment Methodology - a clear roadmap for side-channel - - PowerPoint PPT Presentation
Leakage Assessment Methodology - a clear roadmap for side-channel evaluations - 29. August 2015 Tobias Schneider & Amir Moradi Ruhr-Universitt Bochum Embedded Security Group Outline Motivation Statistical Background Testing
Tobias Schneider & Amir Moradi
Ruhr-Universität Bochum
2
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
3
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
4
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
5
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
6
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
7
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
8
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
– (Hopefully) understandable explanation of the tests – Detailed explanation of how to conduct tests in higher‐orders – Discuss efficiency and accuracy problems and provide efficient and robust formulas – How to design an appropriate framework to host the DUT for such tests, including both software and hardware platforms (e.g., FPGA, µController) – Two case studies
9
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
10
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
Sample Sample
11
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
Sample Sample
12
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
, Γ 1 2 Γ 2 1
2 t , v
13
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
14
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
15
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
16
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
17
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
Sbox out bits (64 models) Sbox in ⊕ out bits (64 models) Sbox 0 nibble (16 models)
18
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
19
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
Specific t‐test
with fixed D Non‐specific t‐test with fixed D
20
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
21
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
22
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
23
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
24
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
25
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
t
:
26
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
,
,
27
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
using raw moments:
28
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
using central moments:
′
29
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
, , , Δ
1 1
30
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
31
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
,
∈
32
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
, , , , ,
Thread Thread 1 Thread 2 Thread 3 Thread 4
33
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
, , , , ,
, , , , ,
, , , , ,
, , , , ,
Thread Thread 1
34
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
, , , , ,
, , , , ,
, , , , ,
, , , , ,
Thread 0 Thread 1 Thread 2 Thread 3
35
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
36
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
37
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
Identify suitable intermediate values for key‐recovery DUT has no countermeasure Failed in former non‐specific tests
38
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
39
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
40
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
41
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
42
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
Robust and One‐Pass Parallel Computation of Correlation‐Based Attacks at Arbitrary Order Tobias Schneider, Amir Moradi, Tim Güneysu, ePrint Report 2015/571
43
Embedded Security Group
Sharif Uni. | Tehran | 29. August 2015 Amir Moradi
Embedded Security Group, Ruhr-Universität Bochum, Germany
amir.moradi@rub.de