Non-profiled Mask Recovery: The Impact of Independent Component Analysis

Si Gao, Elisabeth Oswald, Hua Chen, Wei Xi

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Abstract

As one of the most prevalent SCA countermeasures, masking schemes are designed to defeat a broad range of side channel attacks. An attack vector that is suitable for low-order masking schemes is to try and directly determine the mask(s) (for each trace) by utilising the fact that often an attacker has access to several leakage points of the respectively used mask(s). Good examples for implementations of low-order masking schemes include the table re-computation schemes as well as the masking scheme in DPAContest V4.2. We propose a novel approach based on Independent Component Analysis (ICA) to efficiently utilise the information from several leakage points to reconstruct the respective masks (for each trace) and show it is a competitive attack vector in practice.
Original languageEnglish
Title of host publicationSmart Card Research and Advanced Applications
Subtitle of host publication17th International Conference, CARDIS 2018, Montpelier, France, November 12–14, 2018, Revised Selected Papers
PublisherSpringer, Cham
Pages51-64
Number of pages14
ISBN (Electronic)9783030154622
ISBN (Print)9783030154615
DOIs
Publication statusPublished - 7 Mar 2019

Publication series

NameLecture Notes in Computer Science
Volume11389
ISSN (Print)0302-9743

Keywords

  • Side Channel Analysis
  • Masking
  • Independent Component Analysis

Fingerprint

Dive into the research topics of 'Non-profiled Mask Recovery: The Impact of Independent Component Analysis'. Together they form a unique fingerprint.

Cite this