Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training

Authors

  • Xunyue Hu Sorbonne Université, LIP6, CNRS, 4 Place Jussieu 75005 Paris
  • Quentin L. Meunier Sorbonne Université, LIP6, CNRS, 4 Place Jussieu 75005 Paris
  • Emmanuelle Encrenaz Sorbonne Université, LIP6, CNRS, 4 Place Jussieu 75005 Paris

DOI:

https://doi.org/10.46586/tches.v2025.i1.475-496

Keywords:

Simple Power Attack, Modular Exponentiation, ECDSA, Constant-Time Implementation, Side-Channel Attacks

Abstract

Side-Channel Attacks target the recovery of key material in cryptographic implementations by measuring physical quantities such as power consumption during the execution of a program. Simple Power Attacks consist in deducing secret information from a trace using a single or a few samples, as opposed to differential attacks which require many traces. Software cryptographic implementations usually contain a data-independent execution path, but often do not consider variations in power consumption associated to data. In this work, we show that a technique commonly used to select a value from different possible values in a control-independant way leads to significant power differences depending on the value selected. This difference is actually so important that a single sample can be considered for attacking one condition, and no training on other traces is required. We exploit this finding to propose a single-trace attack without any knowledge gained on previous executions, using trace folding. We target the two modular exponentiation implementations in Libgcrypt, getting respectively 100% and 99.998% correct bits in average on 30 executions using 2,048-bit exponents. We also use this technique to attack the scalar multiplication in ECDSA, successfully recovering all secret nonces on 1,000 executions. Finally, the insights we gained from this work allow us to show that a proposed countermeasure from the literature for performing the safe loading of precomputed operands in the context of windowed implementations can be attacked as well.

Downloads

Published

2024-12-09

Issue

Section

Articles

How to Cite

Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training. (2024). IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025(1), 475-496. https://doi.org/10.46586/tches.v2025.i1.475-496