Conclusion
In this study, a novel power leakage model called correlation leakage model was presented, which utilizes the correlation coefficient between the leakages of intermediate variables to represent the power leakage. By employing mathematical reasoning, the exact formula of this model was given, in which the relationship between the correlation leakage and the sensitive intermediate variable was clearly observed. Based on this leakage model, we proposed a new type of second-order attack, CLA. This CLA can break the first-order masked implementations of cryptographic algorithms; it is applicable to all the cases that can be attacked by second-order analysis. Both the simulated and practical experiments verified the effectiveness and good performance of the CLA attacks.
References
Chari S, Jutla C S, Rao J R, et al. Towards sound approaches to counteract power-analysis attacks. In: Proceedings of Annual International Cryptology Conference, Santa Barbara, 1999. 398–412
Messerges T S. Using second-order power analysis to attack DPA resistant software. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems, Worcester, 2000. 238–251
Joye M, Paillier P, Schoenmakers B. On second-order differential power analysis. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems, Edinburgh, 2005. 293–308
Prouff E, Rivain M, Bevan R. Statistical analysis of second order differential power analysis. IEEE Trans Comput, 2009, 58: 799–811
Clavier C, Feix B, Gagnerot G, et al. Improved collision-correlation power analysis on first order protected AES. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems, Nara, 2011. 49–62
Wang A, Zhang Y, Tian W, et al. Right or wrong collision rate analysis without profiling: full-automatic collision fault attack. Sci China Inf Sci, 2018, 61: 032101
Niu Y, Zhang J, Wang A, et al. An efficient collision power attack on AES encryption in edge computing. IEEE Access, 2019, 7: 18734–18748
Acknowledgements
This work was supported by National Natural Science Foundation of China (Grant Nos. 61872040, U1836101), National Cryptography Development Fund (Grant No. MMJJ20170201), Foundation of Science and Technology on Information Assurance Laboratory (Grant No. KJ-17-009), and Henan Key Laboratory of Network Cryptography Technology (Grant No. LNCT2019-A02).
Author information
Authors and Affiliations
Corresponding authors
Electronic supplementary material
Rights and permissions
About this article
Cite this article
Zhang, J., Niu, Y. & Wang, A. Correlation leakage analysis based on masking schemes. Sci. China Inf. Sci. 65, 129101 (2022). https://doi.org/10.1007/s11432-019-2719-2
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-019-2719-2