Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance
|
|
|
- Nicholas Hancock
- 10 years ago
- Views:
Transcription
1 Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance Shivam Bhasin 1, Jean-Luc Danger 1,2, Sylvain Guilley 1,2 and Zakaria Najm 1 1 Institut MINES-TELECOM, TELECOM ParisTech, CNRS LTCI (UMR 5141), Department COMELEC, 46 rue Barrault, PARIS Cedex 13, FRANCE. 2 Secure-IC S.A.S., 80 avenue des Buttes de Coësmes, Rennes, FRANCE. Abstract Security and safety critical devices must undergo penetration testing including Side-Channel Attacks (SCA) before certification. SCA are powerful and easy to mount but often need huge computation power, especially in the presence of countermeasures. Few efforts have been done to reduce the computation complexity of SCA by selecting a small subset of points where leakage prevails. In this paper, we propose a method to detect relevant leakage points in side-channel traces. The method is based on Normalized Inter-Class Variance (NICV). A key advantage of NICV over state-of-the-art is that NICV does neither need a clone device nor the knowledge of secret parameters of the crypto-system. NICV has a low computation requirement and it detects leakage using public information like input plaintexts or output ciphertexts only. It is shown that NICV can be related to Pearson correlation and signal to noise ratio (SNR) which are standard metrics. NICV can be used to theoretically compute the minimum number of traces required to attack an implementation. A theoretical rationale of NICV with some practical application on real crypto-systems are provided to support our claims. Keywords: Cryptography, side-channel analysis, leakage detection, correlation power analysis (CPA), ANOVA, NICV, TVLA, SNR, AES, linear regression analysis (LRA). 1
2 1 Introduction Security-critical devices must undergo a certification process before being launched into the public market. One of the many security vulnerabilities tested in the certification process is Side-Channel Attacks (SCA [4, 5]). SCA pose a serious practical threat to physical implementation of secure devices by exploiting unintentional leakage from a device like the power consumption, electromagnetic emanation or timing. Several certification/evaluation labs are running SCA daily on devices under test to verify their robustness. The certification process is expensive and time-consuming which also increases the overall time-to-market for the device under test. It worsens when the desired security level increases. For instance, it is usually considered that a Common Criteria (CC [7]) evaluation at highest assurance level for penetration attacks (AVA.VLAN.5) requires the device to resist attacks with 1 million traces. Similarly, the draft ISO standard 17,825 [12] (application note for international standard ISO/IEC , sibling to NIST / FIPS 140-2) demands resistance against side-channel analysis with 10,000 traces (level 3) and with 100,000 traces (level 4). The traces can have millions of points and thus running SCA on these traces can be really time consuming. Also several attacks must be tested on the same set of traces before certifying a device. To accelerate the evaluation process, a methodology should be deployed which compresses the enormous traces to a small set of relevant points. 1.1 Related Works The compression of SCA traces which results in reduced time complexity of the attacks, can be achieved by selecting a small subset of points where leakage prevails. This issue of selecting relevant time samples have been dealt previously by some researchers. Chari et al. [5] use templates to spot interesting time samples. The method involves building templates T on n different values of the subkey. Interesting time samples can then be found as points which maximizes n i,j=1 (T i T j ). In this equation, T i is the average of the traces when the sensitive variable belongs to the class i. Two further improvements were then proposed by Gierlichs et al. [14]. The first improvement, also called as Sum Of Squared pairwise Differences (SOSD), simply computes n i,j=1 (T i T j ) 2. SOSD avoids cancellation of positive and negative differences. SOSD can be further improved by normalizing it by some variance. This normalized SOSD is called SOST (Sum Of Squared pairwise T-differences [14], where a T-difference means a Student T-test) and computed as n i,j=1 T i T j σ i 2 m i + σj 2 m j 2, (1) where σ i is the variance of T in class i, and m i is the number of samples in class i. If m is the total number of traces, we have n i=1 m i = m, and m i is also m 2
3 times the estimated probability for the traces to belong to class i. When the classes are equally populated (i.e., i, m i = m/n), the SOST rewrites as: m n n i,j=1 (T i T j ) 2 σ i2 + σ j 2, Similar ideas were also sketched earlier in [9]. A practical problem with template-based detection techniques comes from the computation of templates. First of all, templates require an access to a clone device. Secondly, templates need two sets of traces: one for profiling with random keys and another for attacking with an unknown but fixed key. An alternative to the latter limitation is model-based templates which can exploit the same set of traces as proposed in [1]. Although model-based templates can be really efficient, they are relevant for the chosen power model only. Another method proposed in this context is the Principal Components Analysis (PCA [20]). PCA is used for dimensionality reduction. It yields a new basis of the time samples in which the inter-class variance is greater. This basis takes into account the covariance of the samples. In side-channel analysis, the goal of PCA is to gather all the information in a single (or few) component(s) [2]. Eventually, other empirical methods use chosen plaintext attacks, such as the differences between plaintexts 0x and 0x ff. This technique requires many requests to check for all the bytes, not only the least significant byte. Furthermore, it is not always possible to choose the plaintext messages (e.g., when modes of operations with initial vectors are used). In this paper, we propose a new method for leakage detection relying on a metric called Normalized Inter-Class Variance (NICV). This NICV method allows to detect interesting time samples, without the need of a profiling stage on a clone device. Hence the SCA traces can be compressed and the analysis could be greatly accelerated. The main characteristics of the proposed method are: NICV operates without the need of a clone device, i.e., it requires no profiling stage and use the same set of traces which are to be analyzed, it uses only public information like plaintext or ciphertext, the method is leakage model agnostic, it is not an analysis tool but a helper to speed up the analysis, but it can serve to evaluate the accuracy of various leakage models and choose which is the best applicable. Compared to PCA, the purpose of NICV is to return the total variation of the traces at each time sample, so as to test which leakage model causes inter-class variation. Our Contributions: Our contributions in this paper is three-fold. Firstly, we develop the theoretical background of NICV for leakage-detection. We relate 3
4 NICV with existing side-channel metrics like Pearson Correlation Coefficient and Signal to Noise Ratio (SNR). NICV is also compared against other leakage detection techniques like SOST and SOSD. Secondly, we provide the theoretical lower bound of number of traces to recover the key. Finally, we apply NICV to real implementations on FPGA and smartcards to show its ability of leakage detection and other related applications. The rest of the paper is organized as follows. General background to SCA is recalled in Sec. 2. The rationale of NICV to select SCA relevant time samples is detailed in Sec. 3. We also derive in this section a lower bound on the number of traces to recover the key. This is followed by some practical use cases applied on real devices like FPGA and smartcards in Sec. 4. Finally, Sec. 5 draws general conclusions. In appendix A, we provide with a comparison between NICV and TVLA (Test Vector Leakage Analysis [15]), two leakage detection metrics. 2 General Background Side-channel analysis consists in exploiting dependencies between the manipulated data and the analog quantities (power consumption, electromagnetic radiation,... ) leaked from a CMOS circuit. Suppose that several power consumption traces, denoted Y, are recorded while a cryptographic device is performing an encryption or decryption operation. An attacker predicts the intermediate leakage L(X), for a known part of the ciphertext (or plaintext) X and key hypothesis K. Next, the attacker uses a distinguisher like Correlation Power Analysis (CPA [4]), to distinguish the correct key k from other false key hypotheses. CPA is a computation of the Pearson Correlation Coefficient ρ between the predicted leakage L(X) and the measured leakage Y, which is defined as: ρ [L(X); Y ] = E [(L(X) E [L(X)]) (Y E [Y ])] Var [L(X)] Var [Y ], where E and Var denote the mean and the variance respectively. We notice that ρ [L(X); Y ] [ 1; +1]. Various distinguishers have been proposed in literature. It is shown in [24] that customary statistical distinguishers eventually turn out to be equivalent when the signal-to-noise ratio gets high. The differences observed by an attacker are due to statistical artifact which arises from imprecise estimations due to limited numbers of observations. In the rest of the paper without loss of generality, we use CPA as a distinguisher. Authors of [24] also show that a proper estimation of leakage model L(X) can define the efficiency of the attack. Therefore a detection technique is needed which can pinpoint the relevant leakage points and the most efficient leakage model. In the following, we introduce NICV as a leakage detection technique and its power to evaluate estimated leakage models. As shown later, NICV is not a SCA channel distinguisher itself. NICV works in co-ordination with 4
5 any SCA distinguishers like CPA to enhance their performance. Even variancebased distinguishers as introduced in [35, 3, 27] can be made more efficient using NICV. As a preprocessing step, NICV can leverage metrics and distinguishers based on Linear Discriminant Analysis (LDA) [21] or on Principal Component Analysis (PCA) [16, 21, 34] are also using some kind of L 2 distance between classes (as does the NICV, see next section). 3 Leakage Detection using NICV In this section, we first describe our normalized inter-class variance (NICV) detection technique. We provide the mathematical background of NICV and then discuss its behavior in a side-channel context. The practical application of NICV is covered in the next section. 3.1 Rationale of the NICV Detection Technique Let us call X one byte of the plaintext or of the ciphertext (that is, the domain of X is X = F 8 2), and Y R the leakage measured by the attacker 1. Both random variables are public knowledge. Then, for all leakage prediction function L of the leakage knowing the value of x taken by X (as per Proposition 5 in [28]), we have: ρ 2 [L(X); Y ] = ρ 2 [L(X); E [Y X]] ρ 2 [E [Y X] ; Y ]. (2) } {{ } 0 1 Again in Corollary 8 of [28], the authors derive: ρ 2 [E [Y X] ; Y ] = Var [E [Y X]] Var [Y ], (3) which we refer to as the normalized inter-class variance (NICV). It is an ANOVA (ANalysis Of VAriance) F-test, as a ratio between the explained variance and the total variance (see also the recent articles [6, 10]). The NICV is also used for linear regression analysis, where it is called the coefficient of determination and usually denoted by the symbol R 2. Eventually, NICV has also the denomination correlation ratio [31]; for instance, it is employed in the context of side-channel analysis in [33], where it is used as a distinguisher and as a linearity metric. Once combined, equations (2) and (3) yield that for all prediction function L : F 8 2 R (realistic or not), we have: 0 ρ 2 [L(X); Y ] Var [E [Y X]] Var [Y ] = NICV 1. (4) 1 In general, Y can be continuous, but X must be discrete (i.e., X is of finite cardinality). 5
6 Therefore, the NICV is the envelop or maximum of all possible correlations computable from X with Y. As a consequence of the Cauchy-Schwarz theorem, there is an equality in (4) if and only if L(x) = E [Y X = x], which is the optimal prediction function 2. In practice, the (square) CPA value does not attain the NICV value, owing to noise and other imperfections. This is illustrated in Fig. 1. The difference can come from various reasons like: The attacker knows the exact prediction function, but as usual not the actual key. For instance, let us assume the traces can be written as Y = w H (S(X k )) + N, where k F 8 2 is the correct key, S : F 8 2 F 8 2 is a substitution box, w H is the Hamming weight function, and N is some measurement noise, that typically follows a centered normal distribution N N (0, σ 2 ). In this case, the optimal prediction function L(x) = E [Y X = x] is equal to: L(x) = w H (S(X k )) (the only hypothesis on the noise is that it is centered and mixed additively with the sensitive variable). This argument is at the base of the soundness of CPA: k k, ρ [w H (S(X k)); Y ] ρ [w H (S(X k )); Y ] Var [E [Y X]] /Var [Y ]. The CPA is smaller than NICV when the attacker assumes a wrong model, for instance L(x) = w H (x k ), when Y = w H (S(x k )) + N. Eventually, the attacker can have an approximation of the leakage model, for instance L(x) = w H (S(x k )), whereas actually Y = 8 i=1 β i S i (x k ) + N, where β i 1, but slightly deviate from one (a.k.a. stochastic model [32]). The distance between CPA and NICV is, in non-information theoretic attacks (i.e., attacks in the proportional / ordinal scale, as opposed to the nominal scale [37]) similar to the distance between perceived information (PI) and mutual information (MI) [29]. Like CPA, NICV also achieves an asymptotically constant value, once the measurement set has reached a representative sample size. It can also be noted that NICV is considered as the relevant distinguisher for the Linear Regression Analysis (LRA) [19, 22], which acts as the CPA but with a parametric leakage model. Now, if X is uniformly distributed, the NICV in itself is not a distinguisher. 2 Rigorously: if and only if L(x) is an affine function of E [Y X = x]. 6
7 1 NICV = Var[E[Y X]] (envelop) Var[Y ] ρ [L(X); Y ] ρ [L(X); Y ] Sbox input Sbox output 0 time L(X) = w H (X k ) L(X) = w H (S(X k )) L(X) = w H (X k), k k (ghost peaks, printed with dashed lines) Figure 1: Illustration on NICV metric when Y = 8 i=1 β i S i (x k ) + N, and correlation coefficient for some prediction functions plotted against time 7
8 Indeed, if we assume that Y = w H (S(X k )) + N, then: Var [E [Y X]] = x X P[X = x]e [Y X = x]2 E [Y ] 2 = x X E [w H(S(x k )) + N] 2 ( x X E [w H(S(x k )) + N] ) 2 = x =x k X E [w H(S(x ))] 2 ( x =x k X E [w H(S(x ))] ) 2 = Var [w H (S(X))]. On the other hand, Var [Y ] = Var [w H (S(X))] + Var [N]. All in one: NICV = Var [E [Y X]] Var [Y ] = SNR, (5) where the signal-to-noise ratio SNR is the ratio between: the signal, i.e., the variance of the informative part, namely Var [w H (S(X k ))], and the noise, considered as the variance Var [N]. Clearly, Eqn. (5) does not depend on the secret key k as both Y and X are public parameters known to the attacker. Moreover, this expression is free from the leakage model L(X), which means that NICV does not depend on the implementation. Thus, NICV searches for all linear dependencies of public parameter X with available leakage traces Y independant of the implementation. In case of protected implementation, if the countermeasure removes all linear leakages related to X, then the NICV should also eventually suppress. On the other hand, NICV can detect accidental linear leakage from a protected implementation. Remark 1 In the binary case (n = 2) when both classes are equally probable, Var[E[Y X]] the expression of NICV simplifies to: NICV = Var[Y ] = ( E[Y X=0] E[Y X=1] 2 ) 2 Var[Y ]. It is similar to Cohen s d metric. Now comparing NICV with other leakage detection techniques like SOST and SOSD we can give the following remarks. Remark 2 SOSD is actually proportional to the inter-class variance (this point. was not made by the authors of [14]). Indeed, with our notations, T i = E [Y X = i]. 8
9 And thus: (T i T j ) 2 = 2 2 n i,j i ( ) 2 Ti 2 2 T i = 2 2 2n E [ Y 2 X = x ] P[x] 2 ( 2 8 E [Y ] ) 2 x = 2 2n+1 Var [E [Y X]]. But this inter-class variance is not normalized. Therefore, the SOSD can be large at samples where Var [N] is large, although not containing (much) information. Remark 3 SOST which was proposed as an improvement over SOSD is normalized. Using our notations, SOST is equal to m (E [Y X = x] E [Y X = x ]) Var[E[Y X=x]] (x,x ) X 2 P[X=x] + Var[E[Y X=x ]] P[X=x ] where m is the number of traces. This certainly is an expression that is not usual in statistics, and a priori cannot be simplified. At the opposite, NICV can be meaningfully expressed as a function of the CPA attack (recall Eqn. (4)). 3.2 Estimation of NICV The number of traces is m, and each trace is indexed by i. In the sequel, when we sum over i, we mean i = 1,..., m. Let (y i ) i=1,...,m be side-channel measurements, and (x i ) i=1,...,m be plaintext bytes. We define the (empirical) probability of a given plaintext byte: ˆP(X = x) = 1 m i s.t. x i=x and the (empirical) per-class average, for a given class x {0,..., 2 n 1}: ( ) ( ) 1 Ê(Y X = x) = y i / 1 = y i, nˆp(x = x) i s.t. x i=x The numerator of the NICV is: Var(Ê(Y X)) = x=0 i s.t. x i=x ( 2 1 n 1 ) 2 1 ˆP(X 2 n = x) (Ê(Y X = x) 2 n 2 1 n 1 2 n m x=0 2 n 1 x=0 ( i s.t. x y ) 2 ( ) 2 i=x i 1 i s.t. x 1 y i. i=x m i 1. i 2, i s.t. x i=x ˆP(X = x)ê(y X = x) ) 2 = 9
10 Eventually, the (empirical) NICV is: NICV = Var(Ê(Y X)) = Var(Y ) ( ) n 1 i s.t. Xi =x yi 2 n m x=0 i s.t. x i =x 1 ( 1 m 1 m i y2 i ( 1 m i y i i y ) 2 i ) 2. (6) We notice that Eqn. (6) can be estimated online using accumulators. 3.3 Lower Bound on the Number of Traces to Break the Key (with CPA) The success rate (0 SR 1) of an attack is the probability that is recovers the correct key. Regarding CPA, the success rate has been computed theoretically by Thillard, Prouff and Roche [36] (a result that extends the previous analytical formula obtained for the difference-of-means test by Fei, Luo and Ding [13]). It is related to the various factors of the experimental setup, namely: the signal-to-noise ratio (which is also directly related to the NICV metric recall Eqn. (5)), the sensitive variable expression, which discriminates more or less easily the correct key (which relates to an algorithmic parameter known as the confusion coefficient noted κ), the number of traces m. The expression takes the following form: SR = Φ( mσ 1/2 µ). In this expression, Φ is the cumulative distribution function of the multivariate Gaussian. Let N k be the number of key hypotheses. Then Σ is a (N k 1) (N k 1) matrix, and µ is column of length (N k 1). In the worst case, the leakage model is very discriminating. This means that the wrong key guesses are all equivalent and yield a null value for the distinguisher. It is a strong assumption, but for good ciphers, such as the AES, this pessimistic approximation is not too far from the reality [23]. In this case, Σ degenerates to a 1 1 matrix (a scalar), equal to: Σ = 2σ 2 (κ 0 κ 1 ). This consists in the application of the disintegration theorem, since the covariance matrix has not full rank. The problem is projected on a smaller matrix of size rank(σ) rank(σ) (in our case, 1 1). In this equation, κ 0 is a generalized confusion coefficient. Also, µ is a scalar, equal to κ 0 κ 1. So, we have: ( ) SR = Φ m κ 0 κ 1 2σ 2. (7) The ratio κ0 κ1 σ is the signal-to-noise ratio; owing to Eqn. (5), it is 1 2 equal to 1 NICV 1. Confer to [18] for a similar relationship. 10
11 So, for a given confidence level in the result of the attack, expressed as targetted success rate SR, we have that the lower bound on the number of traces to break the key is m SR, equal to: m SR = 2σ2 κ 0 κ 1 ( Φ 1 (SR) ) 2, (8) where Φ 1 is the reciprocal function of Φ (recall that Φ is monotonic decreasing). The function ( Φ can be) computed from the error function (in C code, erf) : Φ(y) = 1 2 erf(y/ 2) + 1. It can be checked that Φ 1 (0.80) So, any CPA will require more traces to recover the key than m SR. The equation (8) has a simple interpretation in a log-log graph, where the X axis is σ and the Y axis is m SR. It simply cuts the plan into two halves, that are separated by a straight line (called frontier ), of equation ( ) log 2 m lower bound SR ( ) σ ( = 2 log log κ0 κ 2 Φ 1 (SR) ) 1 ( ) σ = 2 log when SR = 80%. (9) κ0 κ 1 The possible attacks require a number of traces m SR, i.e., such as m SR is above the frontier. A more precise characterization follows. In [36], the confusion coefficient for the CPA is defined as: κ δ = 1 2 n x X = 1 2 n x X L(x k) L(x k ) Where δ = k k L(x) L(x δ) = 1 (L L)(δ), (10) 2n where is the convolution function. We consider the ideal case where L = w H (S(X k)) n 2. This function is defined to be balanced, i.e., x F L(x) = 0. In this case, for δ = 0: κ n 0 = 2 ( ) 1 2 x X n wh (x) n 2 2 = n 4, which does not depend on the exact S. The approximation that all incorrect keys yield a zero value for the distinguisher amounts to say that k 0, κ k = 1 2 (L L)(k) = 0. n So, κ 0 = n/4 (= 2 for AES, where n = 8) and κ 1 = 0, and thus Eqn. (11) becomes: ( ) log 2 m lower bound SR = 2 log2 (σ) when SR = 80%. (11) To illustrate the relevance of the lower bound on the number of traces to break (m SR ), we launch some simulations (cf. Fig. 2), repeated 100 times to gain a reasonable error margin on the success probability. The values in Fig. 2 are in fact the first time in the simulation that SR 0.8; sometimes, the experimental curve SR(m) is increasing and then decreasing. This explains why the values 11
12 Figure 2: Simulated m SR=80% in the graph are sometimes anticipated success rates (i.e., lower than what would have been obtained by smoothing the experimental success rate curves before selecting the m such as SR(m) = 0.8). We assume that the leakage is the Hamming weight of a sensitive variable, that has the form S(X k). The hypothesis k 0, 1 2 (L L)(k) = 0 is all n the more true as S is cryptographically strong. So we investigate different types of bijective sboxes: S(x) = a x d b, where a and b are the constants also used in the AES. The operations and are respectively the addition and the multiplication in the Galois field F 2 8. We consider three values for d: 1. d = 1, i.e., an affine function (the least non-linear), 2. d = 101, i.e., a medium function, and 3. d = 254, i.e., a good function (it is the AES SubBytes). Those three substitution boxes are respectively noted S 1, S 101 and S 254. In addition, for each sbox, we compute an ideal leakage model L no ghost peak (X k), such that: { L no ghost peak w H (S(X k )) n (X k) = 2 if k = k, or w H (S(D)) n 2 otherwise, where D is a dummy random variable, independent from X and drawn uniformly in interval 0, 2 n 1. 12
13 To summarize, in Fig. 2, we compute for the three different sboxes S the two kinds of CPA: With ghost peaks: ρ (w H (S(X k )) + N; w H (S(X k))); Without ghost peaks: ρ ( w H (S(X k )) + N; L no ghost peak (X k) ). Clearly, the attacks do not depend on the sbox in this later case, because we simply remove the rivals, which brings us to the case of distinguishing from two keys. Quite logically, this attack reaches the theoretical minimum. And we see that the less discriminating the sbox, the more traces are required. Remark 4 The values κ(0) κ(1) in Eqn. (7) are computed using the leakage model of Eqn. (10) as: κ(0) max δ 0 κ(δ) for the three studied substitution boxes. When n = 8 (like in the case of AES), it can be proven that whatever the bijective substitution box, κ(0) = n/4 = 2. The value of max δ 0 κ(δ) depends on the substitution box. Namely, we have: For S = S 1 : κ(0) max δ 0 κ(δ) = 0.5, For S = S 101 : κ(0) max δ 0 κ(δ) = 1.5, For S = S 254 : κ(0) max δ 0 κ(δ) = Thus, for a given success rate (say 80%) and a given noise variance σ 2, if the number of traces to break without substitution box (that is, S = S 1 ) is m 1, then: the number of traces to recover the key with L(x k) = w H (S 101 (x k)) would be m = 1 3 m m 1, and the number of traces to recover the key with L(x k) = w H (S 254 (x k)) would be m = 4 13 m m 1. This means that the choice of the substitution boxes impacts the number of traces to extract the key in a factor of about 1 to Discussion The mathematical background of NICV as a leakage detection technique was previously discussed. We learned that NICV has evident advantages over other methods because all its input parameters are public like side-channel traces and associated plaintexts/ciphertexts. Since public parameters are used for computation of NICV, there is no need for access to clone device which is a limiting requirement in template-based detection techniques. Another interesting observation is that the expression of NICV (Eq. (2)) does not contain L(x). In other words, NICV is leakage model agnostic. Moreover from Eq. (4), we learn that NICV forms the envelope of all correlation coefficients for all leakage models. NICV provides the worst case leakage of a devise and therefore estimates the accuracy of leakage model used as illustrated in Fig. 1. Thus NICV has a clear application in comparing various leakage models. 13
14 4 Use Cases We detailed the theoretical soundness and advantages of NICV as a leakage detection technique in Sec. 3. In this section, we apply NICV in practical sidechannel evaluation scenarios. Several use cases of NICV are discussed in the following. 4.1 Accelerating Side-Channel Attacks The main application of NICV is to find the interesting time samples for accelerating SCA. A simple trace of an AES execution can have millions of points. Therefore it is of interest for the evaluator to know few interesting points rather than attacking the whole trace. We first apply the metric on traces of an AES- 128 implementation running on an FPGA which performs one round per clock cycle. These traces are small and contain only 1, 000 points. The comparison of our metric with a correlation coefficient computed with the good key is shown in Fig. 3. The correlation is based on Hamming distance model of the state register of the AES core. The model can be expressed as w H (val i val f ) where val i and val f are initial and final value of the register. This leakage model is shown to be very efficient in CMOS technology. A relevant peak of NICV is seen at the same moment as in correlation peak. Thus NICV is able to detect the point of leakage in the trace. It can be noticed that NICV curve shows several other peaks apart from the correlation peak. As shown later in Sec. 4.2, other peaks in the NICV curve comes either from other leakage models or post-processing of cipher in the circuit NICV ρ(model 1) NICV/ρ Time Sample Figure 3: NICV vs Correlation for a AES-128 hardware implementation Next we apply our metric on a software implementation of AES-256 running 14
15 AddRoundKey SubBytes ShiftRows MixColumns Row 2 Row 3 Row 4 Column 1 Column 2 Column 3 Column 4 Figure 4: NICV computed for a AES-128 software implementation to detect each round operation on an ATMEL AVR microcontroller. It is here that we can see the advantage of NICV. A single trace of this implementation contains 7 million points and needs roughly 5.3 Mbytes of disk space when stored in the most compressed format. These details are in respect to a LeCroy WaveRunner 6100A oscilloscope with a bandwidth of 1 GHz. We applied NICV on these traces to find the leakage points related to each of the 16 bytes of the AES. Fig. 4 shows the computation of NICV on the first round only (for better resolution of results). The computations of Sbox #0 for round 1 takes only 1, 000 time samples. Once the interesting time samples corresponding to each executed operation is known, the trace size is compressed from 7, 000, 000 to 1, 000, i.e., a gain of roughly 7, 000 in attack time. One very interesting application of NICV that we found during our experiments is to reverse engineering. We computed NICV for all the 16 bytes of the plaintext and plotted the 16 NICV curves in Fig. 4 (depicted in different colors). By closely observing Fig. 4, we can distinguish individual operations from the sequence of byte execution. Each NICV curve (each color) shows all sensitive leakages related to that particular byte. Moreover, with a little knowledge of the algorithm, one can easily follow the execution of the algorithm. For example, the execution of all the bytes in a particular sequence indicates the SubBytes or AddRoundKey operation. Manipulation of bytes in sequence {1, 5, 9, 13}, {2, 6, 10, 14} and {3, 7, 11, 15} indicates the ShiftRows operations. The ShiftRows operation of AES shifts circularly 3 out of 4 rows with different constant. This can be clearly seen is Fig. 4: only three rows are manipulated and the bytes in the first row i.e., {0, 4, 8, 12} are not used during this time. Similarly MixColumns can also be identified by just looking the bytes manipulated together. Moreover, detecting precise leakage points of each operation can help an attacker run collision attacks (see e.g., [27, 26]). 15
16 4.2 Testing Leakage Models A common problem in SCA is the choice of leakage model which directly affects the efficiency of the attack. As shown in Sec. 3.1, the square of the correlation between modeled leakage (L(X, K)) and traces (Y = L(X, K ) + N) is smaller or equal to NICV, where N represents a noise. The equality exists only if the modeled leakage is the same as the traces. We tested two different leakage models for the state register resent before the Sbox operation of AES, i.e., w H (val i val f ) 0, 8 (Model 1) and val i val f 0, 255 (Model 2). Similar models are built for another register intentionally introduced at the output of the Sbox, i.e., w H (S(val i ) S(val f )) 0, 8 (Model 3) and S(val i ) S(val f ) 0, 255 (Model 4). We implemented the AES on an FPGA and acquired SCA traces to compare the leakage models. Fig. 5 shows the square of correlation of four different leakage models with the traces against the NICV curve. It can be simply inferred from Fig. 5(b) that Model 4 performs the best while Model 2 is the worst. The gap between NICV and ρ(model 4) 2 is quite large, most probably due to reasons mentioned in Sec This means that there exist other leakage models which could perform better than Model 4. However, finding these models might not be easy because of limited knowledge of design and device characteristics available. Methods based on linear regression [11] can be leveraged to determine the most relevant leakage model. 4.3 Comparing Quality of Measurements SNR is often used to estimate the quality of a measurement setup/traces to compare different measurement setups. The problem with SNR is that it is computed using a specific leakage model. NICV is a good candidate for quality comparison owing to the independence from choice of leakage model. 4.4 Ghost Peaks To further demonstrate the advantageous use of NICV, we implemented a bitslice implementation (i.e., a single bit of plaintext is processed per cycle) of PRESENT algorithm on an ATMEL AVR microcontroller. Firstly we used NICV to localize the activity of an sbox in a multi-million sample trace. Figure 6 (top) shows the result of a CPA on the least significant bit with 10, 000 traces with an SNR of Next we plot the NICV computed with respect to the input plaintext byte in Fig. 6 (bottom). If we compute the success rate of an attack on the whole trace, the ghost peak around sample 900 leads to failure of the attack. However if we compute a success rate on a window around samples where NICV is maximal, we are able to suppress the ghost peak. The success rate of an attack around sample 800, where NICV is maximal is shown in Fig Accelerating SCA on Asymmetric Key Cryptography Asymmetric key cryptography consists in computing exponentiations. For example, in RSA [30], the computation consists in X d (modulo N) from X. For 16
17 NICV ρ(model 1) 2 ρ(model 2) 2 ρ(model 3) 2 ρ(model 4) NICV/ρ Time Sample (a) ρ(model 1) 2 ρ(model 2) 2 ρ(model 3) 2 ρ(model 4) ρ Time Sample (b) Figure 5: (a) NICV vs ρ 2 of four different models, (b) and its zoom the sake of simplicity, let us consider a right-to-left exponentiation. Such ex- 17
18 abs( Correlation ) Good key Time (# of samples) Ghost peaks max(nicv) NICV Time (# of samples) Figure 6: NICV vs Correlation depicting ghost peaks for a software implementation of PRESENT protected by DPL (Dual-rail Precharged Logic) ponentiation is illustrated in Alg. 1, where N is the modulus (e.g., that fits on 1024 bits), and R[1] and R[2] are two 1024 bit temporary registers. Let us call d i the 1024 bits of d. We assume d 0 = 1. Hence the number X 3 will be computed (in R[1]; refer to line 5) if and only if d 1 = 1. This conditional operation is at the basis of the SCA on RSA [25]: if a correlation between the traces Y and the prediction L(X) = X 3 exists, then d 1 = 1; otherwise, d 1 = 0. For this alternative to be tested with NICV, one should compute Y X 3, where X 3 (modulo N) is a large number (e.g., 1, 024 bits). To be tractable, small parts of X 3 like the least significant byte (LSB) shall be used instead of X 3. In this case, a leakage can be detected by computing Var [ E [ Y LSB(X 3 ) ]] /Var [Y ]. The corresponding attack would use the prediction function L(X) = LSB(X 3 ). For sure, the test is relevant only if the bit d 1 is set in the private key d. But if it is not, then maybe d 2 is set. In this case, a leakage can be detected by computing Var [ E [ Y LSB(X 5 ) ]] /Var [Y ]. Similarly, if d 1 = d 2 = 0, it is plausible that d 3 = 1, and thus X 9 is computed. Thus, it is sufficient, in order to detect a leakage [ [ to compute ]] Var E Y LSB(X 2i +1 ) /Var [Y ] for a couple of small i > 0. Any significant peak indicates a potential vulnerability. 18
19 1 Bitslice DPL, poorly balanced Success rate % Success rate : 1470 traces (optimistic) Traces count Figure 7: Success rate of CPA on a software implementation of PRESENT protected by DPL after suppression of ghost peaks using NICV [ [ ]] If, for example, the 10 NICV quantities Var E Y LSB(X 2i +1 ) /Var [Y ], for 1 i 10, are computed (without knowing the key d), then a vulnerability is detected with probability (indeed, 2 10 is the probability of having d 1 =... = d 10 = 0). This methodology is illustrated in Fig. 8. The methodology has been validated in practice, on RSA with an exponent d = ( ) 2, i.e., finishing with three bits at 1. In Fig. 9, we have computed NICV by partitioning on LSB(X 3 ) {0,..., 255}. The NICV indeed features a peak, which validates that d 1 = 1, and that the device leaks. As the peak is really sharp, the leak is strong (our implementation is an ATMega163 smartcard, which is known to leak a lot). For cross-checking, we also plotted in Fig. 9: NICV on LSB(X 5 ), which does not feature a peak (as expected). It would have had a peak if the exponent would have been d = ( ) 2. NICV on LSB(X 7 ), which has a peak, as expected. 5 Conclusions and Perspectives We presented NICV as a leakage detection technique for side-channel leakage. NICV uses public information like plaintext or ciphertext for detecting leakage and trace compression. Therefore NICV has a low computation footprint which can be considered as the worst case leakage analysis which envelops correlation coefficient of all possible leakage models. However NICV cannot be used directly 19
20 Algorithm 1: Unprotected right-to-left 1024 bit RSA implementation Input : X Z N, d = (d 1023,, d 0 ) 2 Output: X d Z N 1 R[1] 1 2 R[2] X 3 for i 0, 1023 do 4 if d i = 1 then 5 R[1] R[2] R[1] /* Multiply */ 6 end 7 R[2] R[2] R[2] /* Square */ 8 end 9 return R[1] R[2] : X X 2 X 4 X 8 X R[1] = X 3 Var[E[Y LSB(X 3 )]] Var[Y ] Leak detected d 1 = 1 Var[E[Y LSB(X 5 )]] Var[Y ] R[1] = X 5 d 2 = 1 Var[E[Y LSB(X 9 )]] Var[Y ] R[1] = X 9 d 3 = 1 Caption:... There is peak There is no peak No leak......with proba Figure 8: Illustration of the application of NICV to RSA 20
21 Figure 9: Result of the methodology of NICV applied to RSA (first two steps of Fig. 8) as a distinguisher for an attack. Unlike templates, NICV can operate on the same set of traces which are used for attack. We can also use NICV to theoretically estimate the lower bound on number of traces to attack an implementation with CPA. We demonstrated the power of NICV in several use cases related to SCA like detecting relevant time samples, comparing leakage models, detecting ghost peaks, etc. Future works can focus on extending the power of NICV in detecting higherorder leakage and extensive application to asymmetric key cryptography. Acknowledgements The authors thank Yip Ching Yu Henry (DSO National Laboratories, Singapore), Yongbin Zhou (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences), Hirofumi Sakane (AIST, Japan) and Emmanuel Prouff (ANSSI, France) for interesting discussions about the leakage metrics, and especially for comments regarding the comparison of NICV and TVLA. Besides, we thank Youssef Souissi (Secure-IC S.A.S.) for more examples of NICV, used as correlation ratio. 21
22 References [1] M. A. E. Aabid, S. Guilley, and P. Hoogvorst. Template Attacks with a Power Model. Cryptology eprint Archive, Report 2007/443, December [2] C. Archambeau, É. Peeters, F.-X. Standaert, and J.-J. Quisquater. Template Attacks in Principal Subspaces. In CHES, volume 4249 of LNCS, pages Springer, October Yokohama, Japan. [3] L. Batina, B. Gierlichs, and K. Lemke-Rust. Differential Cluster Analysis. In C. Clavier and K. Gaj, editors, Cryptographic Hardware and Embedded Systems CHES 2009, volume 5747 of Lecture Notes in Computer Science, pages , Lausanne, Switzerland, Springer-Verlag. [4] É. Brier, C. Clavier, and F. Olivier. Correlation Power Analysis with a Leakage Model. In CHES, volume 3156 of LNCS, pages Springer, August Cambridge, MA, USA. [5] S. Chari, J. R. Rao, and P. Rohatgi. Template Attacks. In CHES, volume 2523 of LNCS, pages Springer, August San Francisco Bay (Redwood City), USA. [6] O. Choudary and M. G. Kuhn. Efficient Template Attacks. Cryptology eprint Archive, Report 2013/770, [7] C. C. Consortium. Common Criteria (aka CC) for Information Technology Security Evaluation (ISO/IEC 15408), Website: [8] J. Cooper, G. Goodwill, J. Jaffe, G. Kenworthy, and P. Rohatgi. Test Vector Leakage Assessment (TVLA) Methodology in Practice, Sept International Cryptographic Module Conference (ICMC), Holiday Inn Gaithersburg, MD, USA. [9] J.-S. Coron, P. C. Kocher, and D. Naccache. Statistics and Secret Leakage. In Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages Springer, February Anguilla, British West Indies. [10] J.-L. Danger, N. Debande, S. Guilley, and Y. Souissi. High-order timing attacks. In Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2 14, pages 7 12, New York, NY, USA, ACM. [11] J. Doget, E. Prouff, M. Rivain, and F.-X. Standaert. Univariate side channel attacks and leakage modeling. J. Cryptographic Engineering, 1(2): ,
23 [12] R. J. Easter, J.-P. Quemard, and J. Kondo. Text for ISO/IEC 1st CD Information technology Security techniques Non-invasive attack mitigation test metrics for cryptographic modules, March Prepared within ISO/IEC JTC 1/SC 27/WG 3. (Online). [13] Y. Fei, Q. Luo, and A. A. Ding. A Statistical Model for DPA with Novel Algorithmic Confusion Analysis. In E. Prouff and P. Schaumont, editors, CHES, volume 7428 of LNCS, pages Springer, [14] B. Gierlichs, K. Lemke-Rust, and C. Paar. Templates vs. Stochastic Methods. In CHES, volume 4249 of LNCS, pages Springer, October Yokohama, Japan. [15] G. Goodwill, B. Jun, J. Jaffe, and P. Rohatgi. A testing methodology for side-channel resistance validation, September NIST Non-Invasive Attack Testing Workshop, non-invasive-attack-testing-workshop/papers/08_goodwill.pdf. [16] S. Guilley, S. Chaudhuri, L. Sauvage, P. Hoogvorst, R. Pacalet, and G. M. Bertoni. Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks. IEEE Transactions on Computers, 57(11): , nov [17] S. Guilley, R. Nguyen, and L. Sauvage. Non-Invasive Attacks Testing: Feedback on Relevant Methods, Sept International Cryptographic Module Conference (ICMC), Holiday Inn Gaithersburg, MD, USA. [18] S. Hajra and D. Mukhopadhyay. SNR to Success Rate: Reaching the Limit of Non-Profiling DPA. Cryptology eprint Archive, Report 2013/865, [19] A. Heuser, W. Schindler, and M. Stöttinger. Revealing side-channel issues of complex circuits by enhanced leakage models. In W. Rosenstiel and L. Thiele, editors, DATE, pages IEEE, [20] I. T. Jolliffe. Principal Component Analysis. Springer Series in Statistics, ISBN: [21] P. Karsmakers, B. Gierlichs, K. Pelckmans, K. D. Cock, J. Suykens, B. Preneel, and B. D. Moor. Side channel attacks on cryptographic devices as a classification problem. COSIC technical report, [22] V. Lomné, E. Prouff, and T. Roche. Behind the scene of side channel attacks. In K. Sako and P. Sarkar, editors, ASIACRYPT (1), volume 8269 of LNCS, pages Springer, [23] S. Mangard. Hardware Countermeasures against DPA A Statistical Analysis of Their Effectiveness. In CT-RSA, volume 2964 of Lecture Notes in Computer Science, pages Springer, San Francisco, CA, USA. 23
24 [24] S. Mangard, E. Oswald, and F.-X. Standaert. One for All - All for One: Unifying Standard DPA Attacks. Information Security, IET, 5(2): , ISSN: ; Digital Object Identifier: /iet-ifs [25] T. S. Messerges, E. A. Dabbish, and R. H. Sloan. Power Analysis Attacks of Modular Exponentiation in Smartcards. In Ç. K. Koç and C. Paar, editors, CHES, volume 1717 of LNCS, pages Springer, [26] A. Moradi, S. Guilley, and A. Heuser. Detecting Hidden Leakages. In I. Boureanu, P. Owesarski, and S. Vaudenay, editors, ACNS, volume Springer, June th International Conference on Applied Cryptography and Network Security, Lausanne, Switzerland. [27] A. Moradi, O. Mischke, and T. Eisenbarth. Correlation-Enhanced Power Analysis Collision Attack. In CHES, volume 6225 of Lecture Notes in Computer Science, pages Springer, August Santa Barbara, CA, USA. [28] E. Prouff, M. Rivain, and R. Bevan. Statistical Analysis of Second Order Differential Power Analysis. IEEE Trans. Computers, 58(6): , [29] M. Renauld, F.-X. Standaert, N. Veyrat-Charvillon, D. Kamel, and D. Flandre. A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices. In EUROCRYPT, volume 6632 of LNCS, pages Springer, May Tallinn, Estonia. [30] R. L. Rivest, A. Shamir, and L. M. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2): , [31] A. Roche, G. Malandain, X. Pennec, and N. Ayache. The Correlation Ratio as a New Similarity Measure for Multimodal Image Registration. In W. M. W. III, A. C. F. Colchester, and S. L. Delp, editors, Medical Image Computing and Computer-Assisted Intervention - MICCAI 98, First International Conference, Cambridge, MA, USA, October 11-13, 1998, Proceedings, volume 1496 of Lecture Notes in Computer Science, pages Springer, [32] W. Schindler, K. Lemke, and C. Paar. A Stochastic Model for Differential Side Channel Cryptanalysis. In LNCS, editor, CHES, volume 3659 of LNCS, pages Springer, Sept Edinburgh, Scotland, UK. [33] Y. Souissi, N. Debande, S. Mekki, S. Guilley, A. Maalaoui, and J.-L. Danger. On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems. In I. G. Askoxylakis, H. C. Pöhls, and J. Posegga, editors, WISTP, volume 7322 of Lecture Notes in Computer Science, pages Springer, June
25 [34] Y. Souissi, M. Nassar, S. Guilley, J.-L. Danger, and F. Flament. First Principal Components Analysis: A New Side Channel Distinguisher. In K. H. Rhee and D. Nyang, editors, ICISC, volume 6829 of Lecture Notes in Computer Science, pages Springer, [35] F.-X. Standaert, B. Gierlichs, and I. Verbauwhede. Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices. In ICISC, volume 5461 of LNCS, pages Springer, December Seoul, Korea. [36] A. Thillard, E. Prouff, and T. Roche. Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack. In G. Bertoni and J.-S. Coron, editors, CHES, volume 8086 of Lecture Notes in Computer Science, pages Springer, [37] C. Whitnall, E. Oswald, and F.-X. Standaert. The Myth of Generic DPA...and the Magic of Learning. In J. Benaloh, editor, CT-RSA, volume 8366 of Lecture Notes in Computer Science, pages Springer, [38] D. W. Zimmerman, B. D. Zumbo, and R. H. Williams. Bias in Estimation and Hypothesis Testing of Correlation. Psicológica, 24: , A NICV vs. TVLA NICV and TVLA are two methods to quantify the leakage of a cryptographic module (CM). They have been discussed recently at the first International Cryptographic Module Conference (09/2013), respectively in presentations [17] and [8]. TVLA consists in operating the CM with a fixed key (specified), exercised under a fixed input message, and under varying messages [15, Sec. 3]. Then, a T-test (See Eqn. (1), for n = 2 classes) is applied on both sets of measurements. A.1 Differences TVLA requires the definition of a set of keys and messages to be tested. This has some side effects. First, it is not always possible to set a key or an input message in a CM; indeed, the key is often initialized randomly or agreed by a protocol, and in most modes of operation, the input message depends upon an initialization vector (IV) that cannot be chosen. Second, this is restrictive as a general method, because new or regional algorithms are created frequently, hence the key / message database of TVLA must keep track of this evolution. Third and the criteria for the selection of keys & inputs is delicate to explain, hence possibly suspicious. At the opposite, with NICV, the device can be tested with its operational key and without chosen inputs. 25
26 TVLA tests whether the leakage varies for two different input types of the CM (hence the computation of a difference), namely varying vs fixed input messages, whereas NICV tests whether the leakage varies of a multiplicity of different inputs (hence the computation of a variance). Also, NICV can focus on each input bit (n = 1) or byte (n = 8). A.2 Common Points As underlined in Remark 2, SOSD and the inter-class variance are proportional. Thus SOST (normalized version of SOSD) and NICV are related, for binary partitionings (i.e., when there are only n = 2 classes). Also, both NICV and TVLA can have an estimation of their bias: the confidence level of NICV is discussed in [23, 38], and in [8] for TVLA. As common drawbacks, simple countermeasures (like desynchronization) almost zero NICV and SOST, despite efficient preprocessing techniques (like realignment) manage to undo them. Therefore NICV and TVLA do not prove the absence of leakage, but provide a systematic way to detect obvious design errors. We notice that both metrics can be used throughout the development process of a CM, as a non-regression test. 26
Unknown Plaintext Template Attacks
Unknown Plaintext Template Attacks Neil Hanley, Michael Tunstall 2, and William P. Marnane Department of Electrical and Electronic Engineering, University College Cork, Ireland. [email protected], [email protected]
Side Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
Least Squares Estimation
Least Squares Estimation SARA A VAN DE GEER Volume 2, pp 1041 1045 in Encyclopedia of Statistics in Behavioral Science ISBN-13: 978-0-470-86080-9 ISBN-10: 0-470-86080-4 Editors Brian S Everitt & David
Physical Security: Status and Outlook
Physical Security: Status and Outlook ECRYPT II: Crypto for 2020 January 22-24, Tenerife, Spain Stefan Tillich Ideal World P C 2 Real World P C, C,errC 3 Implementation Attacks First publication ~ 16 years
The Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) Conception - Why A New Cipher? Conception - Why A New Cipher? DES had outlived its usefulness Vulnerabilities were becoming known 56-bit key was too small Too slow
The Advanced Encryption Standard: Four Years On
The Advanced Encryption Standard: Four Years On Matt Robshaw Reader in Information Security Information Security Group Royal Holloway University of London September 21, 2004 The State of the AES 1 The
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra
Hardware Implementation of AES Encryption and Decryption System Based on FPGA
Send Orders for Reprints to [email protected] The Open Cybernetics & Systemics Journal, 2015, 9, 1373-1377 1373 Open Access Hardware Implementation of AES Encryption and Decryption System Based
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
Implementation of Full -Parallelism AES Encryption and Decryption
Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption
Lecture 3: Linear methods for classification
Lecture 3: Linear methods for classification Rafael A. Irizarry and Hector Corrada Bravo February, 2010 Today we describe four specific algorithms useful for classification problems: linear regression,
DPA : Attaques et Contre-mesures
SECURE DPA : Attaques et Contre-mesures Shivam BHASIN, Taoufik CHOUTA, Guillaume DUC, Jean-Luc DANGER, Aziz EL AABID, Florent FLAMENT, Philippe HOOGVORST, Tarik GRABA, Sylvain GUILLEY, Houssem MAGHR EBI,
Example: Credit card default, we may be more interested in predicting the probabilty of a default than classifying individuals as default or not.
Statistical Learning: Chapter 4 Classification 4.1 Introduction Supervised learning with a categorical (Qualitative) response Notation: - Feature vector X, - qualitative response Y, taking values in C
NCSS Statistical Software Principal Components Regression. In ordinary least squares, the regression coefficients are estimated using the formula ( )
Chapter 340 Principal Components Regression Introduction is a technique for analyzing multiple regression data that suffer from multicollinearity. When multicollinearity occurs, least squares estimates
Statistical Machine Learning
Statistical Machine Learning UoC Stats 37700, Winter quarter Lecture 4: classical linear and quadratic discriminants. 1 / 25 Linear separation For two classes in R d : simple idea: separate the classes
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. #01 Lecture No. #10 Symmetric Key Ciphers (Refer
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks HoonJae Lee 1, ManKi Ahn 2, SeonGan Lim 3, and SangJae Moon 4 1 Dongseo University, Busan, 617-716, Korea [email protected]
RSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
IJESRT. [Padama, 2(5): May, 2013] ISSN: 2277-9655
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Design and Verification of VLSI Based AES Crypto Core Processor Using Verilog HDL Dr.K.Padama Priya *1, N. Deepthi Priya 2 *1,2
A New Generic Digital Signature Algorithm
Groups Complex. Cryptol.? (????), 1 16 DOI 10.1515/GCC.????.??? de Gruyter???? A New Generic Digital Signature Algorithm Jennifer Seberry, Vinhbuu To and Dongvu Tonien Abstract. In this paper, we study
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur Lecture No. #06 Cryptanalysis of Classical Ciphers (Refer
Simple Linear Regression Inference
Simple Linear Regression Inference 1 Inference requirements The Normality assumption of the stochastic term e is needed for inference even if it is not a OLS requirement. Therefore we have: Interpretation
15.062 Data Mining: Algorithms and Applications Matrix Math Review
.6 Data Mining: Algorithms and Applications Matrix Math Review The purpose of this document is to give a brief review of selected linear algebra concepts that will be useful for the course and to develop
1 Data Encryption Algorithm
Date: Monday, September 23, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on the Data Encryption Standard (DES) The Data Encryption Standard (DES) has been
Introduction to General and Generalized Linear Models
Introduction to General and Generalized Linear Models General Linear Models - part I Henrik Madsen Poul Thyregod Informatics and Mathematical Modelling Technical University of Denmark DK-2800 Kgs. Lyngby
Cryptography and Network Security Chapter 9
Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 9 Public Key Cryptography and RSA Every Egyptian received two names,
AP Physics 1 and 2 Lab Investigations
AP Physics 1 and 2 Lab Investigations Student Guide to Data Analysis New York, NY. College Board, Advanced Placement, Advanced Placement Program, AP, AP Central, and the acorn logo are registered trademarks
How To Encrypt With A 64 Bit Block Cipher
The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric
How To Perform Differential Frequency Analysis (Dfa) On A Powerline (Aes) On An Iphone Or Ipad (Ase) On Microsoft Powerline 2 (Aces) On Pc Or Ipa (Aas)
A New Frequency-Based Side Channel Attack for Embedded Systems by Chin Chi Tiu A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Applied
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding
Multivariate Normal Distribution
Multivariate Normal Distribution Lecture 4 July 21, 2011 Advanced Multivariate Statistical Methods ICPSR Summer Session #2 Lecture #4-7/21/2011 Slide 1 of 41 Last Time Matrices and vectors Eigenvalues
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
Overview of Violations of the Basic Assumptions in the Classical Normal Linear Regression Model
Overview of Violations of the Basic Assumptions in the Classical Normal Linear Regression Model 1 September 004 A. Introduction and assumptions The classical normal linear regression model can be written
Linear Codes. Chapter 3. 3.1 Basics
Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length
Software Tool for Implementing RSA Algorithm
Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key
Econometrics Simple Linear Regression
Econometrics Simple Linear Regression Burcu Eke UC3M Linear equations with one variable Recall what a linear equation is: y = b 0 + b 1 x is a linear equation with one variable, or equivalently, a straight
On Correlating Performance Metrics
On Correlating Performance Metrics Yiping Ding and Chris Thornley BMC Software, Inc. Kenneth Newman BMC Software, Inc. University of Massachusetts, Boston Performance metrics and their measurements are
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
Cryptography and Network Security Chapter 3
Cryptography and Network Security Chapter 3 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 3 Block Ciphers and the Data Encryption Standard All the afternoon
Integer Factorization using the Quadratic Sieve
Integer Factorization using the Quadratic Sieve Chad Seibert* Division of Science and Mathematics University of Minnesota, Morris Morris, MN 56567 [email protected] March 16, 2011 Abstract We give
SECRET sharing schemes were introduced by Blakley [5]
206 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 Secret Sharing Schemes From Three Classes of Linear Codes Jin Yuan Cunsheng Ding, Senior Member, IEEE Abstract Secret sharing has
2. Simple Linear Regression
Research methods - II 3 2. Simple Linear Regression Simple linear regression is a technique in parametric statistics that is commonly used for analyzing mean response of a variable Y which changes according
On the representability of the bi-uniform matroid
On the representability of the bi-uniform matroid Simeon Ball, Carles Padró, Zsuzsa Weiner and Chaoping Xing August 3, 2012 Abstract Every bi-uniform matroid is representable over all sufficiently large
Horst Görtz Institute for IT-Security
Horst Görtz Institute for IT-Security On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks Extracting Keys from Xilinx Virtex-II FPGAs Amir Moradi, Alessandro Barenghi, Timo
How to assess the risk of a large portfolio? How to estimate a large covariance matrix?
Chapter 3 Sparse Portfolio Allocation This chapter touches some practical aspects of portfolio allocation and risk assessment from a large pool of financial assets (e.g. stocks) How to assess the risk
Experiment #1, Analyze Data using Excel, Calculator and Graphs.
Physics 182 - Fall 2014 - Experiment #1 1 Experiment #1, Analyze Data using Excel, Calculator and Graphs. 1 Purpose (5 Points, Including Title. Points apply to your lab report.) Before we start measuring
Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards
Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards Junrong Liu 1, Yu Yu 1,2,3, François-Xavier Standaert 4, Zheng Guo 1,5, Dawu Gu 1, Wei Sun 1, Yijie
Efficient Software Implementation of AES on 32-bit Platforms
Efficient Software Implementation of AES on 32-bit Platforms Guido Bertoni, Luca Breveglieri Politecnico di Milano, Milano - Italy Pasqualina Lilli Lilli Fragneto AST-LAB of ST Microelectronics, Agrate
Masao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC.
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SEPKC. Along with a presentation of K(XII)SEPKC over the extension field F 2 8 extensively used for present day various
Cryptography and Network Security
Cryptography and Network Security Fifth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared
A Factoring and Discrete Logarithm based Cryptosystem
Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques
ECE 842 Report Implementation of Elliptic Curve Cryptography
ECE 842 Report Implementation of Elliptic Curve Cryptography Wei-Yang Lin December 15, 2004 Abstract The aim of this report is to illustrate the issues in implementing a practical elliptic curve cryptographic
Supplement to Call Centers with Delay Information: Models and Insights
Supplement to Call Centers with Delay Information: Models and Insights Oualid Jouini 1 Zeynep Akşin 2 Yves Dallery 1 1 Laboratoire Genie Industriel, Ecole Centrale Paris, Grande Voie des Vignes, 92290
CONTENTS OF DAY 2. II. Why Random Sampling is Important 9 A myth, an urban legend, and the real reason NOTES FOR SUMMER STATISTICS INSTITUTE COURSE
1 2 CONTENTS OF DAY 2 I. More Precise Definition of Simple Random Sample 3 Connection with independent random variables 3 Problems with small populations 8 II. Why Random Sampling is Important 9 A myth,
Cryptography and Network Security: Summary
Cryptography and Network Security: Summary Timo Karvi 12.2013 Timo Karvi () Cryptography and Network Security: Summary 12.2013 1 / 17 Summary of the Requirements for the exam The advices are valid for
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL
Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL 1 N. Radhika, 2 Obili Ramesh, 3 Priyadarshini, 3 Asst.Profosser, 1,2 M.Tech ( Digital Systems & Computer Electronics), 1,2,3,
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
6 EXTENDING ALGEBRA. 6.0 Introduction. 6.1 The cubic equation. Objectives
6 EXTENDING ALGEBRA Chapter 6 Extending Algebra Objectives After studying this chapter you should understand techniques whereby equations of cubic degree and higher can be solved; be able to factorise
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard
Design and Implementation of Asymmetric Cryptography Using AES Algorithm
Design and Implementation of Asymmetric Cryptography Using AES Algorithm Madhuri B. Shinde Student, Electronics & Telecommunication Department, Matoshri College of Engineering and Research Centre, Nashik,
STATISTICA Formula Guide: Logistic Regression. Table of Contents
: Table of Contents... 1 Overview of Model... 1 Dispersion... 2 Parameterization... 3 Sigma-Restricted Model... 3 Overparameterized Model... 4 Reference Coding... 4 Model Summary (Summary Tab)... 5 Summary
Area optimized in storage area network using Novel Mix column Transformation in Masked AES
Area optimized in storage area network using Novel Mix column Transformation in Masked AES Mrs.S.Anitha #1, Ms.M.Suganya #2 #1 Assistant professor, #2 P.G.Scholar, II M.E.VLSI Design #1,#2 Department of
A PPENDIX G S IMPLIFIED DES
A PPENDIX G S IMPLIFIED DES William Stallings opyright 2010 G.1 OVERVIEW...2! G.2 S-DES KEY GENERATION...3! G.3 S-DES ENRYPTION...4! Initial and Final Permutations...4! The Function f K...5! The Switch
Introduction to. Hypothesis Testing CHAPTER LEARNING OBJECTIVES. 1 Identify the four steps of hypothesis testing.
Introduction to Hypothesis Testing CHAPTER 8 LEARNING OBJECTIVES After reading this chapter, you should be able to: 1 Identify the four steps of hypothesis testing. 2 Define null hypothesis, alternative
Logistic Regression. Jia Li. Department of Statistics The Pennsylvania State University. Logistic Regression
Logistic Regression Department of Statistics The Pennsylvania State University Email: [email protected] Logistic Regression Preserve linear classification boundaries. By the Bayes rule: Ĝ(x) = arg max
Mathematics Course 111: Algebra I Part IV: Vector Spaces
Mathematics Course 111: Algebra I Part IV: Vector Spaces D. R. Wilkins Academic Year 1996-7 9 Vector Spaces A vector space over some field K is an algebraic structure consisting of a set V on which are
Basics of Statistical Machine Learning
CS761 Spring 2013 Advanced Machine Learning Basics of Statistical Machine Learning Lecturer: Xiaojin Zhu [email protected] Modern machine learning is rooted in statistics. You will find many familiar
Evaluation of Digital Signature Process
Evaluation of Digital Signature Process Emil SIMION, Ph. D. email: [email protected] Agenda Evaluation of digital signatures schemes: evaluation criteria; security evaluation; security of hash functions;
Additional sources Compilation of sources: http://lrs.ed.uiuc.edu/tseportal/datacollectionmethodologies/jin-tselink/tselink.htm
Mgt 540 Research Methods Data Analysis 1 Additional sources Compilation of sources: http://lrs.ed.uiuc.edu/tseportal/datacollectionmethodologies/jin-tselink/tselink.htm http://web.utk.edu/~dap/random/order/start.htm
Normality Testing in Excel
Normality Testing in Excel By Mark Harmon Copyright 2011 Mark Harmon No part of this publication may be reproduced or distributed without the express permission of the author. [email protected]
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Secret Key Cryptography (I) 1 Introductory Remarks Roadmap Feistel Cipher DES AES Introduction
MATH4427 Notebook 2 Spring 2016. 2 MATH4427 Notebook 2 3. 2.1 Definitions and Examples... 3. 2.2 Performance Measures for Estimators...
MATH4427 Notebook 2 Spring 2016 prepared by Professor Jenny Baglivo c Copyright 2009-2016 by Jenny A. Baglivo. All Rights Reserved. Contents 2 MATH4427 Notebook 2 3 2.1 Definitions and Examples...................................
AESvisual: A Visualization Tool for the AES Cipher
AESvisual: A Visualization Tool for the AES Cipher Jun Ma, Jun Tao Department of Computer Science Michigan Technological University Houghton, MI {junm,junt}@mtu.edu Melissa Keranen Department of Mathematical
Institute of Actuaries of India Subject CT3 Probability and Mathematical Statistics
Institute of Actuaries of India Subject CT3 Probability and Mathematical Statistics For 2015 Examinations Aim The aim of the Probability and Mathematical Statistics subject is to provide a grounding in
AES Power Attack Based on Induced Cache Miss and Countermeasure
AES Power Attack Based on Induced Cache Miss and Countermeasure Guido Bertoni, Vittorio Zaccaria STMicroelectronics, Advanced System Technology Agrate Brianza - Milano, Italy, {guido.bertoni, vittorio.zaccaria}@st.com
MULTIPLE LINEAR REGRESSION ANALYSIS USING MICROSOFT EXCEL. by Michael L. Orlov Chemistry Department, Oregon State University (1996)
MULTIPLE LINEAR REGRESSION ANALYSIS USING MICROSOFT EXCEL by Michael L. Orlov Chemistry Department, Oregon State University (1996) INTRODUCTION In modern science, regression analysis is a necessary part
Multivariate Analysis of Ecological Data
Multivariate Analysis of Ecological Data MICHAEL GREENACRE Professor of Statistics at the Pompeu Fabra University in Barcelona, Spain RAUL PRIMICERIO Associate Professor of Ecology, Evolutionary Biology
3-6 Toward Realizing Privacy-Preserving IP-Traceback
3-6 Toward Realizing Privacy-Preserving IP-Traceback The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems
CORRELATED TO THE SOUTH CAROLINA COLLEGE AND CAREER-READY FOUNDATIONS IN ALGEBRA
We Can Early Learning Curriculum PreK Grades 8 12 INSIDE ALGEBRA, GRADES 8 12 CORRELATED TO THE SOUTH CAROLINA COLLEGE AND CAREER-READY FOUNDATIONS IN ALGEBRA April 2016 www.voyagersopris.com Mathematical
Network Security. Chapter 6 Random Number Generation
Network Security Chapter 6 Random Number Generation 1 Tasks of Key Management (1)! Generation:! It is crucial to security, that keys are generated with a truly random or at least a pseudo-random generation
Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay
Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Attacks on Cryptosystems Up to this point, we have mainly seen how ciphers are implemented. We
Component Ordering in Independent Component Analysis Based on Data Power
Component Ordering in Independent Component Analysis Based on Data Power Anne Hendrikse Raymond Veldhuis University of Twente University of Twente Fac. EEMCS, Signals and Systems Group Fac. EEMCS, Signals
A SURVEY ON CONTINUOUS ELLIPTICAL VECTOR DISTRIBUTIONS
A SURVEY ON CONTINUOUS ELLIPTICAL VECTOR DISTRIBUTIONS Eusebio GÓMEZ, Miguel A. GÓMEZ-VILLEGAS and J. Miguel MARÍN Abstract In this paper it is taken up a revision and characterization of the class of
Poisson Models for Count Data
Chapter 4 Poisson Models for Count Data In this chapter we study log-linear models for count data under the assumption of a Poisson error structure. These models have many applications, not only to the
Split Based Encryption in Secure File Transfer
Split Based Encryption in Secure File Transfer Parul Rathor, Rohit Sehgal Assistant Professor, Dept. of CSE, IET, Nagpur University, India Assistant Professor, Dept. of CSE, IET, Alwar, Rajasthan Technical
Nonparametric adaptive age replacement with a one-cycle criterion
Nonparametric adaptive age replacement with a one-cycle criterion P. Coolen-Schrijner, F.P.A. Coolen Department of Mathematical Sciences University of Durham, Durham, DH1 3LE, UK e-mail: [email protected]
Java Modules for Time Series Analysis
Java Modules for Time Series Analysis Agenda Clustering Non-normal distributions Multifactor modeling Implied ratings Time series prediction 1. Clustering + Cluster 1 Synthetic Clustering + Time series
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
