multi tuple leakage detection and the dependent signal
play

Multi-Tuple Leakage Detection and the Dependent Signal Issue - PowerPoint PPT Presentation

Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Multi-Tuple Leakage Detection and the Dependent Signal Issue Olivier Bronchain Tobias Schneider Fran cois-Xavier Standaert CHES 2019, Atlanta, USA Olivier Bronchain


  1. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Multi-Tuple Leakage Detection and the Dependent Signal Issue Olivier Bronchain Tobias Schneider Fran¸ cois-Xavier Standaert CHES 2019, Atlanta, USA Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 1 / 20

  2. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Table of Contents Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 2 / 20

  3. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Content Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 3 / 20

  4. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Side-Channel Issue Encryption on physical devices: ◮ Standard utilization P ’s Crypto C ’s Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 4 / 20

  5. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Side-Channel Issue Encryption on physical devices: ◮ Standard utilization P ’s Crypto C ’s ◮ But with any physical signals l ’s Physical Trace Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 4 / 20

  6. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Side-Channel Issue Encryption on physical devices: ◮ Standard utilization P ’s Crypto C ’s ◮ But with any physical signals ◮ Possibly containing secret information l ’s Physical Trace Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 4 / 20

  7. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Side-Channel Issue Encryption on physical devices: ◮ Standard utilization P ’s Crypto C ’s ◮ But with any physical signals ◮ Possibly containing secret information l ’s Physical Trace Side-channel Attacks: ◮ Known to be hard to prevent ◮ Hard to evaluate as well Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 4 / 20

  8. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Side-Channel Issue Encryption on physical devices: ◮ Standard utilization P ’s Crypto C ’s ◮ But with any physical signals ◮ Possibly containing secret information l ’s Physical Trace Two evaluation approaches: Side-channel Attacks: ◮ Attack based ◮ Known to be hard to prevent ◮ Leakage detection ◮ Hard to evaluate as well Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 4 / 20

  9. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Attack Based Evaluation = ? Can directly mount attacks: P ’s Crypto C ’s 1. Collect measurements l ’s Physical Trace Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 5 / 20

  10. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Attack Based Evaluation = ? Can directly mount attacks: P ’s Crypto C ’s 1. Collect measurements 2. Perform an attack l ’s Physical Trace Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 5 / 20

  11. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Attack Based Evaluation = ? Can directly mount attacks: P ’s Crypto C ’s 1. Collect measurements 2. Perform an attack 3. Retrieve the correct sub-key l ’s Physical Trace Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 5 / 20

  12. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Attack Based Evaluation = ? Can directly mount attacks: P ’s Crypto C ’s 1. Collect measurements 2. Perform an attack 3. Retrieve the correct sub-key l ’s This requires: Physical Trace 1. Long measurement period 2. Skilled/expert knowledge 3. Distinguish 1 sub-key within 256 Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 5 / 20

  13. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Leakage Detection Based Evaluation Leakage detection searches for dependency between manipulated data and physical traces. Crypto Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 6 / 20

  14. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Leakage Detection Based Evaluation Leakage detection searches for dependency between manipulated data and physical traces. 1 or 2 ◮ Feed the core with two different sets of inputs P 1 or P 2 Crypto C 1 or C 2 Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 6 / 20

  15. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Leakage Detection Based Evaluation Leakage detection searches for dependency between manipulated data and physical traces. 1 or 2 ◮ Feed the core with two different sets of inputs P 1 or P 2 Crypto C 1 or C 2 ◮ Record the corresponding traces Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 6 / 20

  16. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Leakage Detection Based Evaluation Leakage detection searches for dependency between manipulated data and physical traces. 1 or 2 ◮ Feed the core with two different sets of inputs P 1 or P 2 Crypto C 1 or C 2 ◮ Record the corresponding traces ◮ Observe differences between the two sets Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 6 / 20

  17. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Leakage Detection Based Evaluation Leakage detection searches for dependency between manipulated data and physical traces. How does it compare with attack based 1 or 2 evaluations: ◮ Shortened measurement period (Possibly) P 1 or P 2 Crypto C 1 or C 2 ◮ No skilled/expert knowledge Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 6 / 20

  18. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Leakage Detection Based Evaluation Leakage detection searches for dependency between manipulated data and physical traces. How does it compare with attack based 1 or 2 evaluations: ◮ Shortened measurement period (Possibly) P 1 or P 2 Crypto C 1 or C 2 ◮ No skilled/expert knowledge A good first check but: ◮ Risk of false positives and false negatives Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 6 / 20

  19. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Content Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 7 / 20

  20. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Leakage Detection Find a difference between the two sets: . Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 8 / 20

  21. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Leakage Detection Find a difference between the two sets: 1. Select a point in time . Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 8 / 20

  22. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Leakage Detection Find a difference between the two sets: 1. Select a point in time 2. Record traces to observe a distribution Distributions . Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 8 / 20

  23. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Leakage Detection Find a difference between the two sets: 1. Select a point in time 2. Record traces to observe a distribution Distributions 3. Perform a statistical test Statistical Test . Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 8 / 20

  24. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Leakage Detection Find a difference between the two sets: 1. Select a point in time 2. Record traces to observe a distribution Distributions 3. Perform a statistical test 4. Observe its binary output Statistical Test No difference found . Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 8 / 20

  25. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Leakage Detection Find a difference between the two sets: 1. Select a point in time 2. Record traces to observe a distribution Distributions 3. Perform a statistical test 4. Observe its binary output Statistical Test Repeat with more measurements if needed No difference found . Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 8 / 20

  26. Introduction Leakage Detection Multi-Tuple Leakage Detection Conclusion Leakage Detection Find a difference between the two sets: 1. Select a point in time 2. Record traces to observe a distribution Distributions 3. Perform a statistical test 4. Observe its binary output Statistical Test Repeat with more measurements if needed Difference found . Olivier Bronchain Multi-Tuple Leakage Detection and the Dependent Signal Issue 8 / 20

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend