Similar Operation Template Attack on RSA-CRT As a Case Study.
Sen Xu,Xiangjun Lu,Kaiyu Zhang,Yang Li,Lei Wang,Weijia Wang,Haihua Gu,Zheng Guo,Junrong Liu,Dawu Gu
DOI: https://doi.org/10.1007/s11432-017-9210-3
2018-01-01
Science China Information Sciences
Abstract:A template attack, the most powerful side-channel attack methods, usually first builds the leakage profiles from a controlled profiling device, and then uses these profiles to recover the secret of the target device. It is based on the fact that the profiling device shares similar leakage characteristics with the target device. In this study, we focus on the similar operations in a single device and propose a new variant of the template attack, called the similar operation template attack (SOTA). SOTA builds the models on public variables (e.g., input/output) and recovers the values of the secret variables that leak similar to the public variables. SOTA’s advantage is that it can avoid the requirement of an additional profiling device. In this study, the proposed SOTA method is applied to a straightforward RSA-CRT implementation. Because the leakage is (almost) the same in similar operations, we reduce the security of RSA-CRT to a hidden multiplier problem (HMP) over GF(q), which can be solved byte-wise using our proposed heuristic algorithm. The effectiveness of our proposed method is verified as an entire prime recovery procedure in a practical leakage scenario.