Score:1

Issue with understanding Side Channel Attacks

dk flag

I am currently working on Side Channel Attacks (SCA) on Kyber and Dilithium. I have found myself quite confused with side channel, because so much is mentionned all the time.

For instance, I don't understand when to use distinguishers, when to use tools like the t-test, when you need to work with key guesses, etc... In the articles I am reading, they sometimes describe the attacks, which I understand, but they don't talk about which tool, which analysis you need, and this really confuses me. I guess I understand each concept individually (DPA, CPA, t-test), but I struggle to put it together.

So if anyone has an idea on where to start, a link to explainations, that would be great.

cn flag
You can take a look at the book "Power Analysis Attacks" by Mangard, Oswald and Popp for an introduction. For the various methods you should always have in mind, what your goal is. If you "just" want to know/evaluate if an implementation might be vulnerable to side-channel attacks, you use other methods (like t-test) than if you actually want to break it (with DPA/CPA).
I sit in a Tesla and translated this thread with Ai:

mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.