s tandard dpa attack
play

S TANDARD DPA ATTACK 0.6 Distinguisher value 3 # std deviations - PowerPoint PPT Presentation

R OBUST P ROFILING FOR DPA-S TYLE A TTACKS Carolyn Whitnall 1 , Elisabeth Oswald 1 1 Department of Computer Science, University of Bristol carolyn.whitnall@bris.ac.uk September 2015 C. W HITNALL (U NIVERSITY OF B RISTOL ) C LUSTERING FOR DPA CHES


  1. R OBUST P ROFILING FOR DPA-S TYLE A TTACKS Carolyn Whitnall 1 , Elisabeth Oswald 1 1 Department of Computer Science, University of Bristol carolyn.whitnall@bris.ac.uk September 2015 C. W HITNALL (U NIVERSITY OF B RISTOL ) C LUSTERING FOR DPA CHES 2015 1 / 19

  2. I NTRODUCTION Top line: Extracting ‘portable’ power models for DPA attacks. ML key recovery ‘Standard’ DPA with fully profiled with ‘standard’ templates models (e.g. HW) ‘Standard’ DPA with approximated leakage models Outline: I Preliminaries: ‘Standard’ DPA; different ‘types’ of power model; unsupervised ( k -means) clustering. I Proposed methodology: unsupervised clustering for building nominal power models. I Experimental results. C. W HITNALL (U NIVERSITY OF B RISTOL ) C LUSTERING FOR DPA CHES 2015 2 / 19

  3. I NTRODUCTION Top line: Extracting ‘portable’ power models for DPA attacks. ML key recovery ‘Standard’ DPA with fully profiled with ‘standard’ templates models (e.g. HW) ‘Standard’ DPA with approximated leakage models Outline: I Preliminaries: ‘Standard’ DPA; different ‘types’ of power model; unsupervised ( k -means) clustering. I Proposed methodology: unsupervised clustering for building nominal power models. I Experimental results. C. W HITNALL (U NIVERSITY OF B RISTOL ) C LUSTERING FOR DPA CHES 2015 2 / 19

  4. ‘S TANDARD DPA ATTACK ’ 0.6 Distinguisher value 3 # std deviations 0.4 2 0.2 1 0 0 − 1 − 0.2 − 2 − 0.4 0 0 20 20 40 40 60 60 Key hypothesis True key Nearest rival C. W HITNALL (U NIVERSITY OF B RISTOL ) C LUSTERING FOR DPA CHES 2015 3 / 19

  5. D IFFERENT TYPES OF POWER MODEL The power model M can approximate the deterministic part of the leakage L at different ‘levels’ . . . L EVEL C ORRESPONDENCE A SSOCIATED ATTACKS Bayesian templates, M ⇡ L Direct stochastic profiling Pearson’s correlation M ⇡ α L Proportional coefficient { z | M ( z ) < M ( z 0 ) } ⇡ Spearman’s rank Ordinal { z | L ( z ) < L ( z 0 ) } 8 z 0 2 Z correlation coefficient ‘Partition’-based: { z | M ( z ) = M ( z 0 ) } ⇡ Nominal mutual information, { z | L ( z ) = L ( z 0 ) } 8 z 0 2 Z variance ratio, etc. C. W HITNALL (U NIVERSITY OF B RISTOL ) C LUSTERING FOR DPA CHES 2015 4 / 19

  6. D IFFERENT TYPES OF POWER MODEL The power model M can approximate the deterministic part of the leakage L at different ‘levels’ . . . L EVEL C ORRESPONDENCE A SSOCIATED ATTACKS Bayesian templates, M ⇡ L Direct stochastic profiling Pearson’s correlation M ⇡ α L Proportional coefficient { z | M ( z ) < M ( z 0 ) } ⇡ Spearman’s rank Ordinal { z | L ( z ) < L ( z 0 ) } 8 z 0 2 Z correlation coefficient ‘Partition’-based: { z | M ( z ) = M ( z 0 ) } ⇡ Nominal mutual information, { z | L ( z ) = L ( z 0 ) } 8 z 0 2 Z variance ratio, etc. C. W HITNALL (U NIVERSITY OF B RISTOL ) C LUSTERING FOR DPA CHES 2015 4 / 19

  7. D IFFERENT TYPES OF POWER MODEL The power model M can approximate the deterministic part of the leakage L at different ‘levels’ . . . L EVEL C ORRESPONDENCE A SSOCIATED ATTACKS Bayesian templates, M ⇡ L Direct stochastic profiling Pearson’s correlation M ⇡ α L Proportional coefficient { z | M ( z ) < M ( z 0 ) } ⇡ Spearman’s rank Ordinal { z | L ( z ) < L ( z 0 ) } 8 z 0 2 Z correlation coefficient ‘Partition’-based: { z | M ( z ) = M ( z 0 ) } ⇡ Nominal mutual information, { z | L ( z ) = L ( z 0 ) } 8 z 0 2 Z variance ratio, etc. C. W HITNALL (U NIVERSITY OF B RISTOL ) C LUSTERING FOR DPA CHES 2015 4 / 19

  8. D IFFERENT TYPES OF POWER MODEL The power model M can approximate the deterministic part of the leakage L at different ‘levels’ . . . L EVEL C ORRESPONDENCE A SSOCIATED ATTACKS Bayesian templates, M ⇡ L Direct stochastic profiling Pearson’s correlation M ⇡ α L Proportional coefficient { z | M ( z ) < M ( z 0 ) } ⇡ Spearman’s rank Ordinal { z | L ( z ) < L ( z 0 ) } 8 z 0 2 Z correlation coefficient ‘Partition’-based: { z | M ( z ) = M ( z 0 ) } ⇡ Nominal mutual information, { z | L ( z ) = L ( z 0 ) } 8 z 0 2 Z variance ratio, etc. C. W HITNALL (U NIVERSITY OF B RISTOL ) C LUSTERING FOR DPA CHES 2015 4 / 19

  9. D IFFERENT TYPES OF POWER MODEL The power model M can approximate the deterministic part of the leakage L at different ‘levels’ . . . L EVEL C ORRESPONDENCE A SSOCIATED ATTACKS Bayesian templates, M ⇡ L Direct stochastic profiling Pearson’s correlation M ⇡ α L Proportional coefficient { z | M ( z ) < M ( z 0 ) } ⇡ Spearman’s rank Ordinal { z | L ( z ) < L ( z 0 ) } 8 z 0 2 Z correlation coefficient ‘Partition’-based: { z | M ( z ) = M ( z 0 ) } ⇡ Nominal mutual information, { z | L ( z ) = L ( z 0 ) } 8 z 0 2 Z variance ratio, etc. C. W HITNALL (U NIVERSITY OF B RISTOL ) C LUSTERING FOR DPA CHES 2015 4 / 19

  10. U NSUPERVISED CLUSTERING Task: Arrange objects s.t. those inside a given group are similar whilst those in different groups are dissimilar . Assumption: Number or characteristics of the underlying classes are a priori unknown (unlike supervised classification). Method: Large selection of iterative trial-and-error solutions: I Cluster models vary: hierarchical, centroid-based, density- or distribution-based, graph-based . . . I ‘Similarity’ measures vary: Euclidean distance, correlation, Hamming, Manhattan . . . N.B.: Notoriously difficult to match the best-suited learning algorithm to a given problem. C. W HITNALL (U NIVERSITY OF B RISTOL ) C LUSTERING FOR DPA CHES 2015 5 / 19

  11. U NSUPERVISED CLUSTERING Task: Arrange objects s.t. those inside a given group are similar whilst those in different groups are dissimilar . Assumption: Number or characteristics of the underlying classes are a priori unknown (unlike supervised classification). Method: Large selection of iterative trial-and-error solutions: I Cluster models vary: hierarchical, centroid-based, density- or distribution-based, graph-based . . . I ‘Similarity’ measures vary: Euclidean distance, correlation, Hamming, Manhattan . . . N.B.: Notoriously difficult to match the best-suited learning algorithm to a given problem. C. W HITNALL (U NIVERSITY OF B RISTOL ) C LUSTERING FOR DPA CHES 2015 5 / 19

  12. U NSUPERVISED CLUSTERING Task: Arrange objects s.t. those inside a given group are similar whilst those in different groups are dissimilar . Assumption: Number or characteristics of the underlying classes are a priori unknown (unlike supervised classification). Method: Large selection of iterative trial-and-error solutions: I Cluster models vary: hierarchical, centroid-based, density- or distribution-based, graph-based . . . I ‘Similarity’ measures vary: Euclidean distance, correlation, Hamming, Manhattan . . . N.B.: Notoriously difficult to match the best-suited learning algorithm to a given problem. C. W HITNALL (U NIVERSITY OF B RISTOL ) C LUSTERING FOR DPA CHES 2015 5 / 19

  13. U NSUPERVISED CLUSTERING Task: Arrange objects s.t. those inside a given group are similar whilst those in different groups are dissimilar . Assumption: Number or characteristics of the underlying classes are a priori unknown (unlike supervised classification). Method: Large selection of iterative trial-and-error solutions: I Cluster models vary: hierarchical, centroid-based, density- or distribution-based, graph-based . . . I ‘Similarity’ measures vary: Euclidean distance, correlation, Hamming, Manhattan . . . N.B.: Notoriously difficult to match the best-suited learning algorithm to a given problem. C. W HITNALL (U NIVERSITY OF B RISTOL ) C LUSTERING FOR DPA CHES 2015 5 / 19

  14. P ROPOSED METHODOLOGY G ENERAL STRATEGY 1 Partition the profiling traces according to the intermediate values and compute the means { ¯ t z } z 2 Z . 2 Obtain a mapping M : Z � ! M by clustering the mean traces. Values in Z not represented in the profiling dataset are mapped to cluster C + 1 (i.e. an ‘other’ category). 3 Use M as the (nominal) power model in ‘partition-based’ DPA against the target traces. E XAMPLE INSTANTIATION Clustering algorithm: Principal component analysis followed by k -means clustering. DPA distinguisher: Univariate and multivariate variance ratio. Benchmark: Correlation DPA using the first principal component to approximate a ‘proportional’ power model. C. W HITNALL (U NIVERSITY OF B RISTOL ) C LUSTERING FOR DPA CHES 2015 6 / 19

  15. P ROPOSED METHODOLOGY G ENERAL STRATEGY 1 Partition the profiling traces according to the intermediate values and compute the means { ¯ t z } z 2 Z . 2 Obtain a mapping M : Z � ! M by clustering the mean traces. Values in Z not represented in the profiling dataset are mapped to cluster C + 1 (i.e. an ‘other’ category). 3 Use M as the (nominal) power model in ‘partition-based’ DPA against the target traces. E XAMPLE INSTANTIATION Clustering algorithm: Principal component analysis followed by k -means clustering. DPA distinguisher: Univariate and multivariate variance ratio. Benchmark: Correlation DPA using the first principal component to approximate a ‘proportional’ power model. C. W HITNALL (U NIVERSITY OF B RISTOL ) C LUSTERING FOR DPA CHES 2015 6 / 19

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend