Skip to main content
Log in

Correlation leakage analysis based on masking schemes

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Conclusion

In this study, a novel power leakage model called correlation leakage model was presented, which utilizes the correlation coefficient between the leakages of intermediate variables to represent the power leakage. By employing mathematical reasoning, the exact formula of this model was given, in which the relationship between the correlation leakage and the sensitive intermediate variable was clearly observed. Based on this leakage model, we proposed a new type of second-order attack, CLA. This CLA can break the first-order masked implementations of cryptographic algorithms; it is applicable to all the cases that can be attacked by second-order analysis. Both the simulated and practical experiments verified the effectiveness and good performance of the CLA attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Chari S, Jutla C S, Rao J R, et al. Towards sound approaches to counteract power-analysis attacks. In: Proceedings of Annual International Cryptology Conference, Santa Barbara, 1999. 398–412

  2. Messerges T S. Using second-order power analysis to attack DPA resistant software. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems, Worcester, 2000. 238–251

  3. Joye M, Paillier P, Schoenmakers B. On second-order differential power analysis. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems, Edinburgh, 2005. 293–308

  4. Prouff E, Rivain M, Bevan R. Statistical analysis of second order differential power analysis. IEEE Trans Comput, 2009, 58: 799–811

    Article  MathSciNet  MATH  Google Scholar 

  5. Clavier C, Feix B, Gagnerot G, et al. Improved collision-correlation power analysis on first order protected AES. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems, Nara, 2011. 49–62

  6. Wang A, Zhang Y, Tian W, et al. Right or wrong collision rate analysis without profiling: full-automatic collision fault attack. Sci China Inf Sci, 2018, 61: 032101

    Article  Google Scholar 

  7. Niu Y, Zhang J, Wang A, et al. An efficient collision power attack on AES encryption in edge computing. IEEE Access, 2019, 7: 18734–18748

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. 61872040, U1836101), National Cryptography Development Fund (Grant No. MMJJ20170201), Foundation of Science and Technology on Information Assurance Laboratory (Grant No. KJ-17-009), and Henan Key Laboratory of Network Cryptography Technology (Grant No. LNCT2019-A02).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Yongchuan Niu or An Wang.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, J., Niu, Y. & Wang, A. Correlation leakage analysis based on masking schemes. Sci. China Inf. Sci. 65, 129101 (2022). https://doi.org/10.1007/s11432-019-2719-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-019-2719-2

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy