{"title":"基于时间随机化的模板侧信道攻击对策","authors":"Farshideh Kordi, Hamed Hosseintalaee, A. Jahanian","doi":"10.22042/ISECURE.2021.262658.592","DOIUrl":null,"url":null,"abstract":"The template attack is one of the most efficient attacks for exploiting the secret key. Template-based attack extracts a model forthe behavior of side channel information from a device which is similar to the target device and then uses this model to retrievethe correct key on the target victim device. Until now, many researchers have focused on improving the performance of templateattacks ,but recently, a few countermeasures have been proposed to protect the design against these attacks. On the other hand,researches show that regular countermeasures against these attacks are costly. Randomized shuffling in the time domain is knownas a cost-effective countermeasure against side-channel attacks that are widely used. In this article, we implemented an actualtemplate attack and proposed an efficient countermeasure against it.We focus on the time shifting method against template attack.The results show that template attack is very susceptible to this method. The performance of attack on an AES algorithm isconsiderably reduced with this method. We reported the analysis results of our countermeasure. The performance of the attackcan be determined according to various criteria. One of these criteria is the success rate of the attack. According to these results,template attack will be hardened significantly after the proposed protection such that the grade of the key recovery increases from1 with 350K traces in unprotected design to 2100 with 700K traces in the protected circuit. This security improvement gains in thecost of about 7% delay overhead.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack\",\"authors\":\"Farshideh Kordi, Hamed Hosseintalaee, A. Jahanian\",\"doi\":\"10.22042/ISECURE.2021.262658.592\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The template attack is one of the most efficient attacks for exploiting the secret key. Template-based attack extracts a model forthe behavior of side channel information from a device which is similar to the target device and then uses this model to retrievethe correct key on the target victim device. Until now, many researchers have focused on improving the performance of templateattacks ,but recently, a few countermeasures have been proposed to protect the design against these attacks. On the other hand,researches show that regular countermeasures against these attacks are costly. Randomized shuffling in the time domain is knownas a cost-effective countermeasure against side-channel attacks that are widely used. In this article, we implemented an actualtemplate attack and proposed an efficient countermeasure against it.We focus on the time shifting method against template attack.The results show that template attack is very susceptible to this method. The performance of attack on an AES algorithm isconsiderably reduced with this method. We reported the analysis results of our countermeasure. The performance of the attackcan be determined according to various criteria. One of these criteria is the success rate of the attack. According to these results,template attack will be hardened significantly after the proposed protection such that the grade of the key recovery increases from1 with 350K traces in unprotected design to 2100 with 700K traces in the protected circuit. This security improvement gains in thecost of about 7% delay overhead.\",\"PeriodicalId\":436674,\"journal\":{\"name\":\"ISC Int. J. Inf. Secur.\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ISC Int. J. Inf. Secur.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.22042/ISECURE.2021.262658.592\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ISC Int. J. Inf. Secur.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22042/ISECURE.2021.262658.592","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack
The template attack is one of the most efficient attacks for exploiting the secret key. Template-based attack extracts a model forthe behavior of side channel information from a device which is similar to the target device and then uses this model to retrievethe correct key on the target victim device. Until now, many researchers have focused on improving the performance of templateattacks ,but recently, a few countermeasures have been proposed to protect the design against these attacks. On the other hand,researches show that regular countermeasures against these attacks are costly. Randomized shuffling in the time domain is knownas a cost-effective countermeasure against side-channel attacks that are widely used. In this article, we implemented an actualtemplate attack and proposed an efficient countermeasure against it.We focus on the time shifting method against template attack.The results show that template attack is very susceptible to this method. The performance of attack on an AES algorithm isconsiderably reduced with this method. We reported the analysis results of our countermeasure. The performance of the attackcan be determined according to various criteria. One of these criteria is the success rate of the attack. According to these results,template attack will be hardened significantly after the proposed protection such that the grade of the key recovery increases from1 with 350K traces in unprotected design to 2100 with 700K traces in the protected circuit. This security improvement gains in thecost of about 7% delay overhead.