Weakly Profiling Side-channel Analysis
DOI:
https://doi.org/10.46586/tches.v2024.i3.707-730Keywords:
Weakly profiling side-channel analysis, Profiling side-channel analysis, Non-profiling side-channel analysis, Plaintext, CiphertextAbstract
Profiling side-channel analysis, recognized for its robust attack performance in worst-case scenarios, necessitates adversaries to have a cloned device for profiling measurements and secret information for data labeling. On the other hand, nonprofiling attacks eschew these requirements by trying all key guesses. Although more suitable for real-world attack scenarios, they may suffer from mediocre attack performance due to the lack of leakage insight.
This paper introduces a novel weakly profiling side-channel analysis method that bridges classical profiling and non-profiling analyses. Our method operates within a profiling framework yet discards the necessity for a cloned device, which relies on the fact that there is (commonly) a bijective relationship between known information, such as plaintext and ciphertext, and secret information. This relationship allows an adversary to label leakage measurements using known information and then profile leakages directly on the attacked device. The empirical results show that the proposed approach achieves at least three times better attack performance with negligible computational effort than existing non-profiling methods. Moreover, it can rival the performance of state-of-the-art profiling attacks.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Lichao Wu, Guilherme Perin, Stjepan Picek
This work is licensed under a Creative Commons Attribution 4.0 International License.