[Resource Topic] 2023/1109: An End-to-end Plaintext-based Side-channel Collision Attack without Trace Segmentation

Welcome to the resource topic for 2023/1109

Title:
An End-to-end Plaintext-based Side-channel Collision Attack without Trace Segmentation

Authors: Lichao Wu, Sébastien Tiran, Guilherme Perin, Stjepan Picek

Abstract:

Side-channel Collision Attacks (SCCA) constitute a subset of non-profiling attacks that exploit information dependency leaked during cryptographic operations. Unlike traditional collision attacks, which seek instances where two different inputs to a cryptographic algorithm yield identical outputs, SCCAs specifically target the internal state, where identical outputs are more likely. In CHES 2023, Staib et al. presented a Deep Learning-based SCCA (DL-SCCA), which enhanced the attack performance while decreasing the required effort for leakage preprocessing. Nevertheless, this method inherits the conventional SCCA’s limitations, as it operates on trace segments reflecting the target operation explicitly, leading to issues such as portability and low tolerance to errors.

This paper introduces an end-to-end plaintext-based SCCA to address these challenges. We leverage the bijective relationship between plaintext and secret data to label the leakage measurement with known information, then learn plaintext-based profiling models to depict leakages from varying operations. By comparing the leakage representations produced by the profiling model, an adversary can reveal the key difference. As an end-to-end approach, we propose an error correction scheme to rectify false predictions. Experimental results indicate our approach significantly surpasses DL-SCCA in terms of attack performance (e.g., success rate increased from 53% to 100%) and computational complexity (training time reduced from approximately 2 hours to 10 minutes). These findings underscore our method’s effectiveness and practicality in real-world attack scenarios.

ePrint: https://eprint.iacr.org/2023/1109

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .