ridge-based profiled differential power analysis

78
SESSION ID: SESSION ID: #RSAC Yu Yu Ridge-based Profiled Differential Power Analysis CRYP-F01 Research Professor Shanghai Jiao Tong University

Upload: priyanka-aash

Post on 13-Apr-2017

12 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Ridge-based Profiled Differential Power Analysis

SESSION ID:SESSION ID:

#RSAC

Yu Yu

Ridge-based Profiled Differential Power Analysis

CRYP-F01

Research ProfessorShanghai Jiao Tong University

Page 2: Ridge-based Profiled Differential Power Analysis

#RSAC

Outline

2

Introduction(Profiled) Differential power analysis

Profiling phase

Exploitation phase

Our contributions

Ridge-based profiling

Theoretical analysisWhy and how is ridge-based profiling better?

How the coefficients shrink in the ridge-based profiling?

Experimental ResultsSimulation-based experiments

Experiments on real FPGA implementation

Page 3: Ridge-based Profiled Differential Power Analysis

#RSAC

Outline

3

Introduction(Profiled) Differential power analysis

Profiling phase

Exploitation phase

Our contributions

Ridge-based profiling

Theoretical analysisWhy and how is ridge-based profiling better?

How the coefficients shrink in the ridge-based profiling?

Experimental ResultsSimulation-based experiments

Experiments on real FPGA implementation

Page 4: Ridge-based Profiled Differential Power Analysis

#RSAC

(profiled) Difference power analysis

4

Two phases:

profiling

Exploitation

Leakage of :

L(·) is leakage function

Power model :

xz

L( )z xT z

M( )

M( ) L( )x xz z

M( )z xT z

Page 5: Ridge-based Profiled Differential Power Analysis

#RSAC

Outline

5

Introduction(Profiled) Differential power analysis

Profiling phase

Exploitation phase

Our contributions

Ridge-based profiling

Theoretical analysisWhy and how is ridge-based profiling better?

How the coefficients shrink in the ridge-based profiling?

Experimental ResultsSimulation-based experiments

Experiments on real FPGA implementation

Page 6: Ridge-based Profiled Differential Power Analysis

#RSAC

Classical profiling

6

The leakage follows Gaussian distribution:

For each intermediate variable z: The adversary finds sample mean and the sample covariance .

Sample mean is obtained by averaging the power consumptions corresponding to intermediate variable z.

To accelerate the profiling: we can assume the sample covariance are identical for all the intermediate variable.

z zM( ) (N ), µz

z

z

Page 7: Ridge-based Profiled Differential Power Analysis

#RSAC

LR-based profiling

7

Page 8: Ridge-based Profiled Differential Power Analysis

#RSAC

LR-based profiling

8

Page 9: Ridge-based Profiled Differential Power Analysis

#RSAC

Pro and con of LR-based profiling

9

Page 10: Ridge-based Profiled Differential Power Analysis

#RSAC

Outline

10

Introduction(Profiled) Differential power analysis

Profiling phase

Exploitation phase

Our contributions

Ridge-based profiling

Theoretical analysisWhy and how is ridge-based profiling better?

How the coefficients shrink in the ridge-based profiling?

Experimental ResultsSimulation-based experiments

Experiments on real FPGA implementation

Page 11: Ridge-based Profiled Differential Power Analysis

#RSAC

Exploitation phases

11

Page 12: Ridge-based Profiled Differential Power Analysis

#RSAC

Outline

12

Introduction(Profiled) Differential power analysis

Profiling phase

Exploitation phase

Our contributions

Ridge-based profiling

Theoretical analysisWhy and how is ridge-based profiling better?

How the coefficients shrink in the ridge-based profiling?

Experimental ResultsSimulation-based experiments

Experiments on real FPGA implementation

Page 13: Ridge-based Profiled Differential Power Analysis

#RSAC

Our contributions

13

(to mitigate the overfitting issue) New profiling method based on ridge-regression

An optimized parameter find method based on cross-validation

Theoretical analysis of the new method’s improvement

Simulation based and practical experiments

Page 14: Ridge-based Profiled Differential Power Analysis

#RSAC

Outline

14

Introduction(Profiled) Differential power analysis

Profiling phase

Exploitation phase

Our contributions

Ridge-based profiling

Theoretical analysisWhy and how is ridge-based profiling better?

How the coefficients shrink in the ridge-based profiling?

Experimental ResultsSimulation-based experiments

Experiments on real FPGA implementation

Page 15: Ridge-based Profiled Differential Power Analysis

#RSAC

Construction of ridge-based profiling

15

Page 16: Ridge-based Profiled Differential Power Analysis

#RSAC

Parameter optimization

16

Page 17: Ridge-based Profiled Differential Power Analysis

#RSAC

Optimized parameter is related to the noise level

17

simulation-based experimenttrace number = 2000

Page 18: Ridge-based Profiled Differential Power Analysis

#RSAC

Outline

18

Introduction(Profiled) Differential power analysis

Profiling phase

Exploitation phase

Our contributions

Ridge-based profiling

Theoretical analysisWhy and how is ridge-based profiling better?

How the coefficients shrink in the ridge-based profiling?

Experimental ResultsSimulation-based experiments

Experiments on real FPGA implementation

Page 19: Ridge-based Profiled Differential Power Analysis

#RSAC

Variance of the coefficients

19

Page 20: Ridge-based Profiled Differential Power Analysis

#RSAC

Variance of the coefficients

20

Figure: The variances of the coefficients for degrees (of the model) and λ. The left and right figures correspond to the cases for d = 1 and d = 2 respectively.

Page 21: Ridge-based Profiled Differential Power Analysis

#RSAC

Variance of the coefficients

21

Figure: The variances of the coefficients for degrees (of the model) and λ. The left and right figures correspond to the cases for d = 4 and d = 8 respectively.

Page 22: Ridge-based Profiled Differential Power Analysis

#RSAC

Outline

22

Introduction(Profiled) Differential power analysis

Profiling phase

Exploitation phase

Our contributions

Ridge-based profiling

Theoretical analysisWhy and how is ridge-based profiling better?

How the coefficients shrink in the ridge-based profiling?

Experimental ResultsSimulation-based experiments

Experiments on real FPGA implementation

Page 23: Ridge-based Profiled Differential Power Analysis

#RSACHow the coefficients shrink in the ridge-based profiling?

23

Page 24: Ridge-based Profiled Differential Power Analysis

#RSAC

Outline

24

Introduction(Profiled) Differential power analysis

Profiling phase

Exploitation phase

Our contributions

Ridge-based profiling

Theoretical analysisWhy and how is ridge-based profiling better?

How the coefficients shrink in the ridge-based profiling?

Experimental ResultsSimulation-based experiments

Experiments on real FPGA implementation

Page 25: Ridge-based Profiled Differential Power Analysis

#RSAC

Setup

25

Profiling methods:ridge-based profiling

LR-based profiling

classical profiling

Target intermediate variable: output of AES-128’s first S-box of the first round.

Univariate leakage.

Different degrees and randomized coefficients.

Metrics: perceived Information, guessing entropy.

Page 26: Ridge-based Profiled Differential Power Analysis

#RSACA comparison of different profilings for leakage degree 8

26

Page 27: Ridge-based Profiled Differential Power Analysis

#RSACA comparison of different profilings for leakage degree 4

27

Page 28: Ridge-based Profiled Differential Power Analysis

#RSACA comparison of different profilings for leakage degree 1

28

Page 29: Ridge-based Profiled Differential Power Analysis

#RSACA comparison of different profilings for with‘conservatively’ degree of model

29

The adversary may have no knowledge about the actual degree of the leakage function.

He can use the model whose degree is higher than the one of the leakage function.

We simulate the traces with leakage functions of degrees 1 and 2 and then conduct the above experiments assuming a model of degree 4 for profiling.

Page 30: Ridge-based Profiled Differential Power Analysis

#RSACDegrees of leakage function and model are 1 and 4 respectively

30

Page 31: Ridge-based Profiled Differential Power Analysis

#RSACDegrees of leakage function and model are 2 and 4 respectively

31

Page 32: Ridge-based Profiled Differential Power Analysis

#RSAC

Outline

32

Introduction(Profiled) Differential power analysis

Profiling phase

Exploitation phase

Our contributions

Ridge-based profiling

Theoretical analysisWhy and how is ridge-based profiling better?

How the coefficients shrink in the ridge-based profiling?

Experimental ResultsSimulation-based experiments

Experiments on real FPGA implementation

Page 33: Ridge-based Profiled Differential Power Analysis

#RSAC

Practical experiments

33

test board: SAKURA-X

oscilloscope: LeCroywaverunner610Zi

Page 34: Ridge-based Profiled Differential Power Analysis

#RSAC

First setting

34

Page 35: Ridge-based Profiled Differential Power Analysis

#RSAC

Second setting (robust profiling)

35

Page 36: Ridge-based Profiled Differential Power Analysis

#RSAC

Summary

36

Ridge-based profiling can save significant factors in the number of traces they need to build a satisfying leakage model:

Better performance for nonlinear leakage functions.

Time complexity: equal to the one of LR-based profiling.

Robust profiling.

Page 37: Ridge-based Profiled Differential Power Analysis

#RSAC

37

THANK YOU

Question?

Page 38: Ridge-based Profiled Differential Power Analysis

SESSION ID:SESSION ID:

#RSAC

Si Gao

My Traces Learn What You Did in the Dark: Recovering Secret Signals without Key Guesses

CRYP-F01

PhD StudentTrusted Computing and Information Assurance Laboratory Institute of Software,

Chinese Academy of Sciences

Page 39: Ridge-based Profiled Differential Power Analysis

#RSAC

Outline

Applications in SCA

ICA-based signal recovery

Preliminaries

Introduction

Summary

Page 40: Ridge-based Profiled Differential Power Analysis

#RSAC

Outline

Applications in SCA

ICA-based signal recovery

Preliminaries

Introduction

Summary

Page 41: Ridge-based Profiled Differential Power Analysis

#RSAC

Introduction

Side Channel Analysis (SCA)Exploit the computation leakages

— Leakages depend on the intermediate state

Page 42: Ridge-based Profiled Differential Power Analysis

#RSAC

Introduction

Traditional SCA flow (Non-profiled) Guess-and-determine

— Step 1: take a key guess

Eve

Encryption Algorithm

Plaintext

k1

k2

k3

.

.

.

kr

Key Guess List Signal List

.

.

.

.

Actual

Leakage

Most likely key

guess k

1 1 1

(1),..., ( )k k kx x Tx

2 2 2

(1),..., ( )k k kx x Tx

(1),..., ( )r r rk k kx x Tx

(1),..., ( )l l Tl

Intermediate States

(Assumed)

Leakage

Model

M

Expected

Leakages

1 1 1

= ( (1)),..., ( ( ))k k kM M M Tx x x

2 1 1

= ( (1)),..., ( ( ))k k kM M M Tx x x

= ( (1)),..., ( ( ))r r rk k kM M M Tx x x

.

.

.

.

Page 43: Ridge-based Profiled Differential Power Analysis

#RSAC

Introduction

Traditional SCA flow (Non-profiled) Guess-and-determine

— Step 2: Compute the intermediate states from T plaintexts and the key guess Eg. The output of an AES Sbox, x=S(p⊕kg)

Eve

Encryption Algorithm

Plaintext

k1

k2

k3

.

.

.

kr

Key Guess List Signal List

.

.

.

.

Actual

Leakage

Most likely key

guess k

1 1 1

(1),..., ( )k k kx x Tx

2 2 2

(1),..., ( )k k kx x Tx

(1),..., ( )r r rk k kx x Tx

(1),..., ( )l l Tl

Intermediate States

(Assumed)

Leakage

Model

M

Expected

Leakages

1 1 1

= ( (1)),..., ( ( ))k k kM M M Tx x x

2 1 1

= ( (1)),..., ( ( ))k k kM M M Tx x x

= ( (1)),..., ( ( ))r r rk k kM M M Tx x x

.

.

.

.

Page 44: Ridge-based Profiled Differential Power Analysis

#RSAC

Introduction

Traditional SCA flow (Non-profiled) Guess-and-determine

— Step 3: Compute the expected leakages of the key guess Eg. The Hamming Weight model, where M(x)=HW(x)

Eve

Encryption Algorithm

Plaintext

k1

k2

k3

.

.

.

kr

Key Guess List Signal List

.

.

.

.

Actual

Leakage

Most likely key

guess k

1 1 1

(1),..., ( )k k kx x Tx

2 2 2

(1),..., ( )k k kx x Tx

(1),..., ( )r r rk k kx x Tx

(1),..., ( )l l Tl

Intermediate States

(Assumed)

Leakage

Model

M

Expected

Leakages

1 1 1

= ( (1)),..., ( ( ))k k kM M M Tx x x

2 1 1

= ( (1)),..., ( ( ))k k kM M M Tx x x

= ( (1)),..., ( ( ))r r rk k kM M M Tx x x

.

.

.

.

Page 45: Ridge-based Profiled Differential Power Analysis

#RSAC

Introduction

Traditional SCA flow (Non-profiled) Guess-and-determine

— Step 4: Finding out the most likely key guess Eg. In CPA, rank key guesses with Pearson's correlation coefficient

Eve

Encryption Algorithm

Plaintext

k1

k2

k3

.

.

.

kr

Key Guess List Signal List

.

.

.

.

Actual

Leakage

Most likely key

guess k

1 1 1

(1),..., ( )k k kx x Tx

2 2 2

(1),..., ( )k k kx x Tx

(1),..., ( )r r rk k kx x Tx

(1),..., ( )l l Tl

Intermediate States

(Assumed)

Leakage

Model

M

Expected

Leakages

1 1 1

= ( (1)),..., ( ( ))k k kM M M Tx x x

2 1 1

= ( (1)),..., ( ( ))k k kM M M Tx x x

= ( (1)),..., ( ( ))r r rk k kM M M Tx x x

.

.

.

.

Page 46: Ridge-based Profiled Differential Power Analysis

#RSAC

Introduction

Traditional SCA flow (Non-profiled) Question: did Eve actually recover the intermediate states x?

— Only found the most likely one from a predetermined list

Not a problem for SCA

— Focus on key recovery (Kerckhoffs's principle)

Pros

— The predetermined list (signal list) << whole signal space

— SCA works when SNR<<1

— Efficient key-recovery

Page 47: Ridge-based Profiled Differential Power Analysis

#RSAC

Introduction

Traditional SCA flow (Non-profiled) Cons

— The key guess space should be small

— Known plaintext/ciphertext, known encryption algorithms

Eve

Encryption Algorithm

Plaintext

k1

k2

k3

.

.

.

kr

Signal List

.

.

.

.

Actual

Leakage

Most likely key

guess k

1 1 1

(1),..., ( )k k kx x Tx

2 2 2

(1),..., ( )k k kx x Tx

(1),..., ( )r r rk k kx x Tx

(1),..., ( )l l Tl

Intermediate States

(Assumed)

Leakage

Model

M

Expected

Leakages

1 1 1

= ( (1)),..., ( ( ))k k kM M M Tx x x

2 1 1

= ( (1)),..., ( ( ))k k kM M M Tx x x

= ( (1)),..., ( ( ))r r rk k kM M M Tx x x

.

.

.

.

Page 48: Ridge-based Profiled Differential Power Analysis

#RSAC

Introduction

Traditional SCA flow (Non-profiled) Limitations: only works for the first/last few rounds

— The related key guess space is too large for SCA Eg. In AES, the first/last two rounds are protected

Eve

Encryption Algorithm

Plaintext

k1

k2

k3

.

.

.

kr

Key Guess List Signal List

.

.

.

.

Actual

Leakage

Most likely key

guess k

1 1 1

(1),..., ( )k k kx x Tx

2 2 2

(1),..., ( )k k kx x Tx

(1),..., ( )r r rk k kx x Tx

(1),..., ( )l l Tl

Intermediate States

(Assumed)

Leakage

Model

M

Expected

Leakages

1 1 1

= ( (1)),..., ( ( ))k k kM M M Tx x x

2 1 1

= ( (1)),..., ( ( ))k k kM M M Tx x x

= ( (1)),..., ( ( ))r r rk k kM M M Tx x x

.

.

.

.

Too large

Page 49: Ridge-based Profiled Differential Power Analysis

#RSAC

Introduction

Traditional SCA flow (Non-profiled) Limitations: Side Channel Analysis for Reverse Engineering

— Cannot compute the intermediate states

Eve

Encryption Algorithm

Plaintext

k1

k2

k3

.

.

.

kr

Key Guess List Signal List

.

.

.

.

Actual

Leakage

Most likely key

guess k

1 1 1

(1),..., ( )k k kx x Tx

2 2 2

(1),..., ( )k k kx x Tx

(1),..., ( )r r rk k kx x Tx

(1),..., ( )l l Tl

Intermediate States

(Assumed)

Leakage

Model

M

Expected

Leakages

1 1 1

= ( (1)),..., ( ( ))k k kM M M Tx x x

2 1 1

= ( (1)),..., ( ( ))k k kM M M Tx x x

= ( (1)),..., ( ( ))r r rk k kM M M Tx x x

.

.

.

.

Unknown

Page 50: Ridge-based Profiled Differential Power Analysis

#RSAC

Introduction

A New Model (Non-profiled) Directly exploit the leakages, without the pre-determined list

A much harder problem

— Signal List<<Signal Space

— A preliminary attempt in this direction

Eve

Actual

Leakage

Most likely key

guess k

(1),..., ( )l l Tl

Intermediate States

(Assumed)

Leakage

Model

M

* * *1 ,..., Tx x x

Page 51: Ridge-based Profiled Differential Power Analysis

#RSAC

Introduction

Notes on profiled attacks Much stronger pre-conditions

— The Attacker gets an identical encryption device Build templates

Perform template matching

— Works even if T=1 (in theory)

— Reverse the intermediate states without key guesses

Not always appropriate

— Power Variability Issues [Renauld, M., et al EUROCRYPT 2011]

We only focus on non-profiled attacks in this paper

Eve

Actual

Leakage

Most likely key

guess k

(1),..., ( )l l Tl

Intermediate States

Templates

Tp

* * *1 ,..., Tx x x

Page 52: Ridge-based Profiled Differential Power Analysis

#RSAC

Outline

Applications in SCA

ICA-based signal recovery

Preliminaries

Introduction

Summary

Page 53: Ridge-based Profiled Differential Power Analysis

#RSAC

Preliminaries

Blind Source Separation (BSS)n people were talking simultaneously

m microphones placed in different positions

all records can be regarded as linear mixtures of the original conversations

source from http://http://slsp.kaist.ac.kr/xe/?mid=BSS

Page 54: Ridge-based Profiled Differential Power Analysis

#RSAC

Preliminaries

Blind Source Separation (BSS)

unknown sources:n conversations

unknown mix matrix:the mix features of m microphones

source from http://http://slsp.kaist.ac.kr/xe/?mid=BSS

Page 55: Ridge-based Profiled Differential Power Analysis

#RSAC

Preliminaries

Independent Component Analysis (ICA)Blind sources S=(s1,s2,…,sn)

Linear mix matrix A

m observations Y=(y1,y2,…,ym)

Y=A*S+N (N represents the noise )

source from http://http://slsp.kaist.ac.kr/xe/?mid=BSS

Goal: recover S from Y

Page 56: Ridge-based Profiled Differential Power Analysis

#RSAC

Preliminaries

Independent Component Analysis (ICA)ICA assumptions

— Independence: the sources are independent of each other

— Non-gaussian: the distribution of the blind sources are not gaussian

— n ≤ m

ICA algorithms

— Many popular algorithms

— Not “that” different, use FastICA in this paper

Page 57: Ridge-based Profiled Differential Power Analysis

#RSAC

Outline

Applications in SCA

ICA-based signal recovery

Preliminaries

Introduction

Summary

Page 58: Ridge-based Profiled Differential Power Analysis

#RSAC

ICA-based signal recovery

ICA versus SCA: Similaritiesn bits intermediate state X

Assume the leakage s.t. the weighted Hamming Weight Model

Page 59: Ridge-based Profiled Differential Power Analysis

#RSAC

ICA-based signal recovery

ICA versus SCA: DifferencesNumber of observations: m v.s. 1

Level of Noise: low v.s. high

0 1 1( ) n nL x x x

Page 60: Ridge-based Profiled Differential Power Analysis

#RSAC

ICA-based signal recovery

Constructing multi-channel observationsXOR constant

— If a binary source s is XORed with a constant k, the resultant source s′ is

— XOR 1 equals to flip the signal sign

— Move the sign to the leakage function

— Different leakage functions→ Multi-channel observations

0 '

1 1

k

k

ss

s

Page 61: Ridge-based Profiled Differential Power Analysis

#RSAC

ICA-based signal recovery

Constructing multi-channel observationsXOR constant

Whitening Transformation

0,1s

* 1,1 s2

0

1

Whitening Transformation

' 1 1,0 s s

*' 1, 1 s

( 1)

ICA ambiguity

Leakage Function

L

Leakage Function

L

Real

source

Equivalent

source

Page 62: Ridge-based Profiled Differential Power Analysis

#RSAC

ICA-based signal recovery

Noise toleranceNoise affects the performance of ICA

— ICA usually works in cases where SNR>>1

— For application in SCA, we need more robust algorithm

Ignored feature in ICA

— the distribution of the sources is given: binary signals

— the priori distribution can make ICA more robust to noise

— EM-ICA: specialized for discrete sources with random noise, using Expectation-Maximization algorithm [Belouchrouni, Cardoso 1994]

Page 63: Ridge-based Profiled Differential Power Analysis

#RSAC

ICA-based signal recovery

Specialized ICA for SCAA specialized ICA based on EM-ICA

Page 64: Ridge-based Profiled Differential Power Analysis

#RSAC

Outline

Applications in SCA

ICA-based signal recovery

Preliminaries

Introduction

Summary

Page 65: Ridge-based Profiled Differential Power Analysis

#RSAC

Applications in SCA

Experimental SettingTarget Implementation— Unprotected software implementation of DES— 8 bit microprocessor (IC card)

Measurement— LeCroy WaveRunner 610Zi oscilloscope

— Sampling at 20 MSa/s, 80 000 sample points per trace (first 3 rounds)— 20 000 traces

Extra property— Perform P bit-by-bit

— Bit-wise leakage Natural multi-channel observations

Page 66: Ridge-based Profiled Differential Power Analysis

#RSAC

Applications in SCA

New SCA distinguisherAttack one of the Sbox in the first round

— Recover the intermediate states from ICA

— Compute the Sbox outputs with key guess

— Find the correct key through

comparing the distance between and

kX k

rX

kXrX

L0 R0

IP

ESP

L1 R1

ESP

K1

K2

……

rX

kX

Page 67: Ridge-based Profiled Differential Power Analysis

#RSAC

Applications in SCA

New SCA distinguisherAttack one of the Sbox in the first round

— Key rank: CPA (HW) v.s. ICA

Page 68: Ridge-based Profiled Differential Power Analysis

#RSAC

Applications in SCA

Extending SCA to the Middle RoundsRecovering the 8 Sboxes’ outputs in the second round

— 4-bit outputs, n=4

— The success rate of an ICA recovery

L0 R0

IP

ESP

L1 R1

ESP

K1

K2

……

rX

Correct signal

Page 69: Ridge-based Profiled Differential Power Analysis

#RSAC

Applications in SCA

Extending SCA to the Middle RoundsRecovering the 8 Sboxes’ outputs in the second round

— 80% success rate is usually more than enough for round-reduced key-recovery

Page 70: Ridge-based Profiled Differential Power Analysis

#RSAC

Applications in SCA

Reverse Engineering on SboxA customized DES with secret Sboxes

— Attacker controls the plaintext

— Attacker knows IP and E

— The secret key is embedded in the secret Sbox

— Traditional non-profiled SCA does not work (secret Sbox)

— Attacker can choose several leakage points

'( ) ( )S x S x k

L0 R0

IP

ESP

L1 R1

ESP

K1

K2

……

rX

Page 71: Ridge-based Profiled Differential Power Analysis

#RSAC

Applications in SCA

Reverse Engineering on SboxA customized DES with secret Sboxes

— Leakage point selection: Manually pick

Linear Discriminant Analysis (LDA)

— Linear Discriminant Analysis Do not need precise points, only an approximate range

Better recovery with larger trace sets

not suitable when the number of traces is smaller than the range of interest

Page 72: Ridge-based Profiled Differential Power Analysis

#RSAC

Applications in SCA

Reverse Engineering on SboxA customized DES with secret Sboxes

Page 73: Ridge-based Profiled Differential Power Analysis

#RSAC

Applications in SCA

Reverse Engineering on Feistel Round FunctionA customized Feistel cipher (both S and P are altered)

— Attacker controls the plaintext

— Attacker knows IP and E

— The first Sbox’s input in the second round

The 6 least significant bits of E

First round function Initial state after IP

L0 R0

IP

ESP

L1 R1

ESP

K1

K2

……

rX

Page 74: Ridge-based Profiled Differential Power Analysis

#RSAC

Applications in SCA

Reverse Engineering on Feistel Round FunctionA customized Feistel cipher (both S and P are altered)

— Build observations with our XOR constant method Choose L0 so that E0(L0)={0x01,0x02,0x04,0x08,0x10,0x20}

Randomly picked a T-length signal R0

Measure the leakages for each (E0,R0)

Repeat 10 times, randomly pick other bits in L0

XOR constant secret signal

L0 R0

IP

ESP

L1 R1

ESP

K1

K2

……

rX

Page 75: Ridge-based Profiled Differential Power Analysis

#RSAC

Applications in SCA

Reverse Engineering on Feistel Round FunctionA customized Feistel cipher (both S and P are altered)

Page 76: Ridge-based Profiled Differential Power Analysis

#RSAC

Outline

Applications in SCA

ICA-based signal recovery

Preliminaries

Introduction

Summary

Page 77: Ridge-based Profiled Differential Power Analysis

#RSAC

Summary

SCA ≠ guess-and-determineDirectly recover the secret intermediate states without any key guess

— Proposed an ICA-based SCA Construct multi-channel observations with XOR constant

Utilize the priori distribution with EM-ICA

— New possibilities in non-profiled SCA Attacking the middle round’s encryption

Reverse engineering with fewer restrictions

A promising tool in the future?

— Needs more research effort

Page 78: Ridge-based Profiled Differential Power Analysis

#RSAC

Thanks for your attention!