首页> 外文会议>International conference on smart card research and advanced applications >A Semi-Parametric Approach for Side-Channel Attacks on Protected RSA Implementations
【24h】

A Semi-Parametric Approach for Side-Channel Attacks on Protected RSA Implementations

机译:一种半参数方法,用于受保护的RSA实现中的侧信道攻击

获取原文

摘要

Side-channel attacks on RSA aim at recovering the secret exponent by processing multiple power or electromagnetic traces. The exponent blinding is the main countermeasure which avoids the application of classical forms of side-channel attacks, like SPA, DPA, CPA and template attacks. Horizontal attacks overcome RSA countermeasures by attacking single traces. However, the processing of a single trace is limited by the amount of information and the leakage assessment using labeled samples is not possible due to the exponent blinding countermeasure. In order to overcome these drawbacks, we propose a side-channel attack framework based on a semi-parametric approach that combines the concepts of unsupervised learning, horizontal attacks, maximum likelihood estimation and template attacks in order to recover the exponent bits. Our method is divided in two main parts: learning and attacking phases. The learning phase consists of identifying the class parameters contained in the power traces representing the loop of the exponentiation. We propose a leakage assessment based on unsupervised learning to identify points of interest in a blinded exponentiation. The attacking phase executes a horizontal attack based on clustering algorithms to provide labeled information. Furthermore, it computes confidence probabilities for all exponent bits. These probabilities indicate how much our semi-parametric approach is able to learn about the class parameters from the side-channel information. To demonstrate the power of our framework we attack the private exponent d_p of the 1024-bit RSA-CRT implementation protected by the SPA, 32-bit message blinding, and 64-bit exponent blinding countermeasures; the implementation runs on a 32-bit STM32F4 microcontroller.
机译:对RSA的侧信道攻击旨在通过处理多个电源或电磁走线来恢复秘密指数。指数盲是主要的对策,它避免了应用传统形式的边信道攻击,例如SPA,DPA,CPA和模板攻击。水平攻击通过攻击单个迹线来克服RSA的对策。但是,单条迹线的处理受到信息量的限制,并且由于指数盲目的对策,因此无法使用标记的样品进行泄漏评估。为了克服这些缺点,我们提出了一种基于半参数方法的边信道攻击框架,该框架结合了无监督学习,水平攻击,最大似然估计和模板攻击的概念,以恢复指数位。我们的方法分为两个主要部分:学习和攻击阶段。学习阶段包括识别包含在幂迹线中的代表幂循环的类参数。我们提出基于无监督学习的泄漏评估,以识别盲幂运算中的兴趣点。攻击阶段基于聚类算法执行水平攻击,以提供标记信息。此外,它计算所有指数位的置信概率。这些概率表明我们的半参数方法能够从边信道信息中了解类参数的程度。为了证明我们框架的强大功能,我们攻击了受SPA,32位消息盲目和64位指数盲目对策保护的1024位RSA-CRT实现的私有指数d_p;该实现在32位STM32F4微控制器上运行。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号