skip to main content
10.1145/1368310.1368319acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

An overview of side channel analysis attacks

Published: 18 March 2008 Publication History

Abstract

During the last ten years, power analysis attacks have been widely developed under many forms. They analyze the relation between the power consumption or electromagnetic radiation of a cryptographic device and the handled data during cryptographic operations. The goal of this paper is to give a global view of statistical attacks based on side channel analysis. These techniques are classified into two classes: attacks without reference device (e.g. Differential Power Analysis, Correlation Power Analysis) and attacks using a reference device (e.g. Template Attack, Stochastic Model Attack). In this paper, we present the attacks with an easy comprehensible way and focus on their implementation aspect. The pros and cons of each attack is highlighted in details with concrete electromagnetic signals. At least, our paper proposes also some solutions to enhance the existing attacks.

References

[1]
P. Kocher, J. Jaffe and B. Jun, "Differential Power Analysis", In proceedings of CRYPTO 1999, LNCS 1666, pp. 388--397, Springer-Verlag, 1999.
[2]
R. Anderson and M. Kuhn. Tamper Resistance - a Cautionary Note. In Proceedings of 2nd USENIX Workshop on Electronic Commerce, pp. 1--11, Oakland, California, 1996.
[3]
H. Handschul, P. Paillier, and J. Stern. Probing Attacks on Tamper Resiseant Devices. In Proceedings of CHES 1999, pp. 303--315, Massachusetts, USA, 1999. LNCS 1717.
[4]
T. S. Messerges, E. A. Dabbish and R. H. Sloan, "Examining Smart-Card Security under the Threat of Power Analysis Attacks", IEEE Transactions on Computer, Vol. 51, N5, pp. 541--552, May 2002.
[5]
R. Bevan and E. Knudsen, "Ways to Enhance DPA", In proceedings of ICISC 2002, LNCS 2587, pp. 327--342, Springer-Verlag, 2003.
[6]
T. H. Le, J. Clédière, C. Canovas, C. Servière, J. L. Lacoume and B. Robisson, "A proposition for Correlation Power Analysis enhancement", In Proceedings of CHES 2006, LNCS 4249, Springer-Verlag, Yokohama, Japan 2006
[7]
T. Messerges, C. Koc, and P. Christof. Using Second-Order Power Analysis to Attack DPA Resistance Software. In proceedings of CHES 2000, pp. 238--251, Massachusetts, USA, 2000. LNCS 1965, Springer Verlag.
[8]
J. Waddle and D. Wagner, "Towards efficient second-order power analysis", In Proceedings of CHES 2004, LNCS 3156, Springer-Verlag, pp. 1--15, Cambridge (Boston), USA 2004.
[9]
M. Joye, P. Paillier and B. Schoenmarkers "On Second-Order Differential Power Analysis", In Proceedings of CHES 2005, LNCS 3659, Springer-Verlag, pp. 293--308, Edinburgh, Scotland, USA 2005.
[10]
S. Chari, C. Jutla, J. Rao, and P. Rohatgi, "A Cautionary Note regarding Evaluation of AES Candidates on Smart-Cards". In Proceedings of the 2nd Advanced Encryption Standard Candidate Conference, Rome, Italy, 1999.
[11]
R. Mayer-Sommer, "Smartly analysing the simplicity and the power of simple power analysis on smartcards" In Proceedings of CHES 2000, pp. 78--92, Massachusetts, USA, 2000. LNCS 1965, Springer Verlag.
[12]
J. S. Coron, P. Kocher and D. Naccache, "Statistics and Secret Leakage", In proceedings of Financial Cryptography, LNCS 1972, pp 157--173, Springer-Verlag, 2000.
[13]
E. Brier, C. Clavier and F. Olivier, "Correlation Power Analysis with a Leakage Model", In proceedings of CHES 2004, LNCS 3156, pp. 16--29, Springer-Verlag, 2004.
[14]
J. J. Quisquater and D. Samyde, "Electromagnetic Analysis (EMA): Measures and Countermeasures for Smart Cards", In proceedings of e-Smart 2001, LNCS 2140, pp. 200--201, Springer, 2001.
[15]
K. Gandolfi, C. Mourtel and F. Olivier, "Electromagnetic Analysis: Concrete Results", In proceeding of CHES 2001, LNCS 2162, pp. 252--261, Springer, 2001.
[16]
H. Li, A. T. Markettos and S. Moore, "Security Evaluation Against Electromagnetic Analysis at Design Time", In proceedings of CHES 2005, LNCS 3659, Edinburgh, Scotland 2005
[17]
D. Agrawal, J. R. Rao and P. Rohatgi, "Multi-channel Attacks", In proceedings of CHES 2003, LNCS 2779, Springer-Verlag, Cologne, Germany 2003.
[18]
E. Peeters, F. Standaert, and J. Quisquater. Power and electromagnetic analysis: Improved model, consequences and comparisons. In INTEGRATION, the VLSI Journal, volume 40. Elsevier Science.
[19]
P. Fahn and P. Pearson. IPA: A New Class of Power Attacks. In Proceedings of CHES 1999, LNCS 1717, pp. 173--186, Massachusetts, USA, 1999. Springer-Verlag.
[20]
A. Chari, J. Rao, and P. Rohatgi, "Template Attacks", In Proceedings of CHES02, LNCS 2523, pp. 13--28, San Francisco Bay, USA, 2002. Springer-Verlag.
[21]
W. Schindler, K. Lemke, and C. Paar, "A Stochastic Model for Differential Side Channel Cryptanalysis". In Proceedings of CHES 2005, LNCS 3659, pages 30--46, Edinburgh, Scotland 2005
[22]
C. Clavier, J. Coron, and N. Dabbous, "Differential power analysis in the presence of hardware countermeasures", In Proceedings of CHES 2000, volume LNCS 1965, Massachusetts, USA.
[23]
S. Mangard, "Hardware countermeasure against DPA - A statistical analysis of their effectiveness", in CT-RSA 2004, Springer, LNCS 2964, 2007, pp. 222--235.
[24]
L. Goubin and J. Patarin, "DES and Differential Power Analysis: The Duplication Method". In Proceedings of CHES 1999, pp. 158--172, Massachusetts, USA, 1999. LNCS 1717, Springer Verlag.
[25]
S. Chari, C. S. Jutla, J. R. Rao and P. Rohatgi, "Towards Sound Approaches to Counteract Power-Analysis Attacks". In Proceedings of CRYPTO 1999, pp. 398--412, Santa Barbara, California USA, 1999. LNCS 1666, Springer 1999.
[26]
T. H. Le, J. Clédière, C. Servière and J. L. Lacoume, "Higher Order Statistics for Side Channel Analysis Enhancement", In Proceedings of e-Smart 2006, Sophia Antipolis, France, September 2006
[27]
T. H. Le, J. Clédière, C. Servière and J. L. Lacoume, "Efficient solution for Signal Misalignment of Signal in Side Channel Analysis". In Proceedings of ICASSP 2007, Honolulu, Hawaii, USA, April 2007.
[28]
T. H. Le, Q. T Nguyen-Vuong, C. Canovas and J. Cléedière, "Novel Approaches for Improving the Power Consumption Models in Correlation Analysis". In Cryptology ePrint Archive, Available online: http://eprint.iacr.org/2007/306
[29]
D. Agrawal, J. R Rao, P. Rohatgi and K. Schramm, "Templates as Master Keys" In proceedings of CHES 2005, Springer, Edinburgh, UK, 2005.
[30]
C. Rechberger and E. Oswald, "Practical Template Attacks", In Workshop on Information Security Applications, WISA 2004, Jeju Island Korea, August 2004.
[31]
B. Gierlichs, K. Lemke-Rust and C. Paar, "Template vs. Stochastic Methods", In Proceedings of CHES 2006, LNCS 4249, Springer-Verlag, Yokohama, Japan 2006

Cited By

View all
  • (2025)Attack Detection and Countermeasures at Edge DevicesSmart Cyber‐Physical Power Systems10.1002/9781394191529.ch20(539-553)Online publication date: 14-Feb-2025
  • (2024)Domain-Agnostic Representation of Side-ChannelsEntropy10.3390/e2608068426:8(684)Online publication date: 13-Aug-2024
  • (2024)Advice for the First Time Hardware CTF OrganizerProceedings of the 55th ACM Technical Symposium on Computer Science Education V. 210.1145/3626253.3635582(1756-1757)Online publication date: 14-Mar-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications security
March 2008
399 pages
ISBN:9781595939791
DOI:10.1145/1368310
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 March 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. CPA
  2. DEMA
  3. DPA
  4. side channel attacks
  5. stochastic model
  6. template attack

Qualifiers

  • Research-article

Conference

Asia CCS '08
Sponsor:

Acceptance Rates

Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)152
  • Downloads (Last 6 weeks)24
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Attack Detection and Countermeasures at Edge DevicesSmart Cyber‐Physical Power Systems10.1002/9781394191529.ch20(539-553)Online publication date: 14-Feb-2025
  • (2024)Domain-Agnostic Representation of Side-ChannelsEntropy10.3390/e2608068426:8(684)Online publication date: 13-Aug-2024
  • (2024)Advice for the First Time Hardware CTF OrganizerProceedings of the 55th ACM Technical Symposium on Computer Science Education V. 210.1145/3626253.3635582(1756-1757)Online publication date: 14-Mar-2024
  • (2023)A Practical Non-Profiled Deep-Learning-Based Power Analysis with Hybrid-Supervised Neural NetworksElectronics10.3390/electronics1215336112:15(3361)Online publication date: 6-Aug-2023
  • (2023)ICVTest: A Practical Black-Box Penetration Testing Framework for Evaluating Cybersecurity of Intelligent Connected VehiclesApplied Sciences10.3390/app1401020414:1(204)Online publication date: 25-Dec-2023
  • (2023)Design and Security-Mitigation of Custom and Configurable Hardware Cryptosystems2023 IEEE 16th Dallas Circuits and Systems Conference (DCAS)10.1109/DCAS57389.2023.10130190(1-6)Online publication date: 14-Apr-2023
  • (2022)A Voltage Template Attack on the Modular Polynomial Subtraction in Kyber2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC)10.1109/ASP-DAC52403.2022.9712513(672-677)Online publication date: 17-Jan-2022
  • (2022)On the performance of non‐profiled side channel attacks based on deep learning techniquesIET Information Security10.1049/ise2.1210217:3(377-393)Online publication date: 20-Dec-2022
  • (2021)Cyber-Physical System and Internet of Things SecurityResearch Anthology on Combating Denial-of-Service Attacks10.4018/978-1-7998-5348-0.ch018(328-357)Online publication date: 2021
  • (2021)An Extensible Evaluation Platform for FPGA Bitstream Obfuscation Security2021 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)10.1109/ISVLSI51109.2021.00032(120-125)Online publication date: Jul-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media