Correlation leakage analysis based on masking schemes

Jiawei Zhang, Yongchuan Niu*, An Wang*

*Corresponding author for this work

Research output: Contribution to journalLetterpeer-review

1 Citation (Scopus)

Abstract

In this study, a novel power leakage model called correlation leakage model was presented, which utilizes the correlation coefficient between the leakages of intermediate variables to represent the power leakage. By employing mathematical reasoning, the exact formula of this model was given, in which the relationship between the correlation leakage and the sensitive intermediate variable was clearly observed. Based on this leakage model, we proposed a new type of second-order attack, CLA. This CLA can break the first-order masked implementations of cryptographic algorithms; it is applicable to all the cases that can be attacked by second-order analysis. Both the simulated and practical experiments verified the effectiveness and good performance of the CLA attacks.

Original languageEnglish
Article number129101
JournalScience China Information Sciences
Volume65
Issue number2
DOIs
Publication statusPublished - Feb 2022

Fingerprint

Dive into the research topics of 'Correlation leakage analysis based on masking schemes'. Together they form a unique fingerprint.

Cite this