Architecture Correlation Analysis (ACA): Identifying the Source of Side-channel Leakage at Gate-level

Author(s):  
Yuan Yao ◽  
Tarun Kathuria ◽  
Baris Ege ◽  
Patrick Schaumont
2012 ◽  
Vol 2012 ◽  
pp. 1-9 ◽  
Author(s):  
Laurent Sauvage ◽  
Sylvain Guilley ◽  
Florent Flament ◽  
Jean-Luc Danger ◽  
Yves Mathieu

Side channel and fault injection attacks are major threats to cryptographic applications of embedded systems. Best performances for these attacks are achieved by focusing sensors or injectors on the sensible parts of the application, by means of dedicated methods to localise them. Few methods have been proposed in the past, and all of them aim at pinpointing the cryptoprocessor. However it could be interesting to exploit the activity of other parts of the application, in order to increase the attack's efficiency or to bypass its countermeasures. In this paper, we present a localisation method based on cross-correlation, which issues a list of areas of interest within the attacked device. It realizes an exhaustive analysis, since it may localise any module of the device, and not only those which perform cryptographic operations. Moreover, it also does not require a preliminary knowledge about the implementation, whereas some previous cartography methods require that the attacker could choose the cryptoprocessor inputs, which is not always possible. The method is experimentally validated using observations of the electromagnetic near field distribution over a Xilinx Virtex 5 FPGA. The matching between areas of interest and the application layout in the FPGA floorplan is confirmed by correlation analysis.


10.29007/qszz ◽  
2018 ◽  
Author(s):  
Poulami Das ◽  
Debapriya Basu Roy ◽  
Debdeep Mukhopadhyay

Horizontal collision correlation analysis (HCCA) imposes a serious threat tosimple power analysis resistant elliptic curve cryptosystems involving unified algorithms, for e.g. Edward curve unified formula. This attack can be mounted even in presence of differential power analysis resistant randomization schemes. In this paper we have designed an effective countermeasure for HCCA protection, where the dependency of side-channel leakage from a school-book multiplication with the underling multiplier operands is investigated. We have shown how changing the sequence in which the operands are passed to the multiplication algorithm introduces dissimilarity in the information leakage. This disparity has been utilized in constructing a zero-cost countermeasure against HCCA. This countermeasure has been shown to help in HCCA resistivity. Additionally we provide experimental validation for our proposed countermeasure technique on a SASEBO platform. To the best of our knowledge, this is the first time that asymmetry in information leakage has been utilized in designing a side channel countermeasure and successfully applied in an ECC-based crypto-module.


2017 ◽  
Vol 2017 ◽  
pp. 1-8
Author(s):  
An Wang ◽  
Yu Zhang ◽  
Liehuang Zhu ◽  
Weina Tian ◽  
Rixin Xu ◽  
...  

Correlation Power Analysis (CPA) introduced by Brier et al. in 2004 is an important method in the side-channel attack and it enables the attacker to use less cost to derive secret or private keys with efficiency over the last decade. In this paper, we propose R-squared fitting model analysis (RFA) which is more appropriate for nonlinear correlation analysis. This model can also be applied to other side-channel methods such as second-order CPA and collision-correlation power attack. Our experiments show that the RFA-based attacks bring significant advantages in both time complexity and success rate.


2018 ◽  
Vol 8 (10) ◽  
pp. 2002 ◽  
Author(s):  
Sung Cho ◽  
Sunghyun Jin ◽  
HeeSeok Kim

Unified point addition for computing elliptic curve point addition and doubling is considered to be resistant to simple power analysis. Recently, new side-channel attacks, such as recovery of secret exponent by triangular trace analysis and horizontal collision correlation analysis, have been successfully applied to elliptic curve methods to investigate their resistance to side-channel attacks. These attacks turn out to be very powerful since they only require leakage of a single power consumption trace. In this paper, using these side-channel attack analyses, we introduce two vulnerabilities of unified point addition on the binary Huff curve. Also, we propose a new unified point addition method for the binary Huff curve. Furthermore, to secure against these vulnerabilities, we apply an equivalence class to the side-channel atomic algorithm using the proposed unified point addition method.


Author(s):  
D.R. Ensor ◽  
C.G. Jensen ◽  
J.A. Fillery ◽  
R.J.K. Baker

Because periodicity is a major indicator of structural organisation numerous methods have been devised to demonstrate periodicity masked by background “noise” in the electron microscope image (e.g. photographic image reinforcement, Markham et al, 1964; optical diffraction techniques, Horne, 1977; McIntosh,1974). Computer correlation analysis of a densitometer tracing provides another means of minimising "noise". The correlation process uncovers periodic information by cancelling random elements. The technique is easily executed, the results are readily interpreted and the computer removes tedium, lends accuracy and assists in impartiality.A scanning densitometer was adapted to allow computer control of the scan and to give direct computer storage of the data. A photographic transparency of the image to be scanned is mounted on a stage coupled directly to an accurate screw thread driven by a stepping motor. The stage is moved so that the fixed beam of the densitometer (which is directed normal to the transparency) traces a straight line along the structure of interest in the image.


2010 ◽  
Vol 26 (4) ◽  
pp. 256-262 ◽  
Author(s):  
Ulrike Petermann ◽  
Franz Petermann ◽  
Ina Schreyer

The Strengths and Difficulties Questionnaire (SDQ) is a screening instrument that addresses positive and negative behavioral attributes of children and adolescents. Although this questionnaire has been used in Germany to gather information from parents and teachers of preschoolers, few studies exist that verify the validity of the German SDQ for this age. In the present study, teacher ratings were collected for 282 children aged 36 to 60 months (boys = 156; girls = 126). Likewise, teacher ratings were collected with another German checklist for behavior problems and behavior disorders at preschool age (Verhaltensbeurteilungsbogen für Vorschulkinder, VBV 3–6). Moreover, children’s developmental status was assessed. Evaluation included correlation analysis as well as canonical correlation analysis to assess the multivariate relationship between the set of SDQ variables and the set of VBV variables. Discriminant analyses were used to clarify which SDQ variables are useful to differentiate between children with or without developmental delay in a multivariate model. The results of correlation and discriminant analyses underline the validity of the SDQ for preschoolers. According to these results, the German teacher SDQ is recommended as a convenient and valid screening instrument to assess positive and negative behavior of preschool age children.


1985 ◽  
Vol 24 (02) ◽  
pp. 91-100 ◽  
Author(s):  
W. van Pelt ◽  
Ph. H. Quanjer ◽  
M. E. Wise ◽  
E. van der Burg ◽  
R. van der Lende

SummaryAs part of a population study on chronic lung disease in the Netherlands, an investigation is made of the relationship of both age and sex with indices describing the maximum expiratory flow-volume (MEFV) curve. To determine the relationship, non-linear canonical correlation was used as realized in the computer program CANALS, a combination of ordinary canonical correlation analysis (CCA) and non-linear transformations of the variables. This method enhances the generality of the relationship to be found and has the advantage of showing the relative importance of categories or ranges within a variable with respect to that relationship. The above is exemplified by describing the relationship of age and sex with variables concerning respiratory symptoms and smoking habits. The analysis of age and sex with MEFV curve indices shows that non-linear canonical correlation analysis is an efficient tool in analysing size and shape of the MEFV curve and can be used to derive parameters concerning the whole curve.


Sign in / Sign up

Export Citation Format

Share Document