Weakly Profiling Side-channel Analysis

Authors

  • Lichao Wu Technical University of Darmstadt, Darmstadt, Germany,
  • Guilherme Perin Leiden University, Leiden, The Netherlands
  • Stjepan Picek Radboud University, Nijmegen, The Netherlands

DOI:

https://doi.org/10.46586/tches.v2024.i3.707-730

Keywords:

Weakly profiling side-channel analysis, Profiling side-channel analysis, Non-profiling side-channel analysis, Plaintext, Ciphertext

Abstract

Profiling side-channel analysis, recognized for its robust attack performance in worst-case scenarios, necessitates adversaries to have a cloned device for profiling measurements and secret information for data labeling. On the other hand, nonprofiling attacks eschew these requirements by trying all key guesses. Although more suitable for real-world attack scenarios, they may suffer from mediocre attack performance due to the lack of leakage insight.
This paper introduces a novel weakly profiling side-channel analysis method that bridges classical profiling and non-profiling analyses. Our method operates within a profiling framework yet discards the necessity for a cloned device, which relies on the fact that there is (commonly) a bijective relationship between known information, such as plaintext and ciphertext, and secret information. This relationship allows an adversary to label leakage measurements using known information and then profile leakages directly on the attacked device. The empirical results show that the proposed approach achieves at least three times better attack performance with negligible computational effort than existing non-profiling methods. Moreover, it can rival the performance of state-of-the-art profiling attacks.

Downloads

Published

2024-11-22

Issue

Section

Articles

How to Cite

Weakly Profiling Side-channel Analysis. (2024). IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024(3), 707-730. https://doi.org/10.46586/tches.v2024.i3.707-730