2005
DOI: 10.1007/978-3-540-30580-4_7
|View full text |Cite
|
Sign up to set email alerts
|

On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods

Abstract: Abstract. A number of papers on side-channel attacks have been published where the side-channel information was not exploited in an optimal manner, which reduced their efficiency. A good understanding of the source and the true risk potential of an attack is necessary to rate the effectiveness of possible countermeasures. This paper explains a general approach to optimize the efficiency of side-channel attacks by advanced stochastic methods. The approach and its benefits are illustrated by examples.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
20
0

Year Published

2005
2005
2021
2021

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 22 publications
(21 citation statements)
references
References 17 publications
(52 reference statements)
1
20
0
Order By: Relevance
“…The interested reader is referred to [14], Sect. 4 (see also [13], Sect. 7) where such a sieving algorithm was introduced for a timing attack on a weak AES implementation.…”
Section: Suitable Covariance Matrix C) and If Kmentioning
confidence: 95%
See 1 more Smart Citation
“…The interested reader is referred to [14], Sect. 4 (see also [13], Sect. 7) where such a sieving algorithm was introduced for a timing attack on a weak AES implementation.…”
Section: Suitable Covariance Matrix C) and If Kmentioning
confidence: 95%
“…Using such methods, the efficiency of some known attacks could be increased considerably (up to a factor of fifty), some attacks could be generalized and new attacks were conceived ( [12,13,14]). The understanding of the source of an attack and its true risk potential is important for a designer of a cryptographic system for implementing effective and reliable countermeasures that prevent also privileged attacks.…”
Section: Introductionmentioning
confidence: 99%
“…These attacks were generalized and optimized by advanced stochastic methods (cf. [9,11,12]). In particular, the efficiency of the attack from [5] could be increased by a factor of 50.…”
Section: Introductionmentioning
confidence: 97%
“…In the first phase, the adversary analyzes the profiling device in order to approximate the leakage behavior and in the second phase, the adversary attacks the target device. Typical examples are the template-based attack (TA) [5], [6] and Stochastic Approach (SA) [7], [8]. The practical aspects of template attacks (TA) have been discussed in [9], [10].…”
Section: Introductionmentioning
confidence: 99%