International Association for Cryptologic Research

International Association
for Cryptologic Research

Transactions on Cryptographic Hardware and Embedded Systems, Volume 2023

Separating Oil and Vinegar with a Single Trace


README

Separating Oil and Vinegar with a Single Trace

This repository contains auxiliary material for the paper: "Separating Oil and Vinegar with a Single Trace : Side-Channel Assisted Reconciliation Attack on UOV".

Authors:
- Thomas Aulbach
- Fabio Campos
- Juliane Krämer
- Simona Samardjiska
- Marc Stöttinger

Overview

This repository allows to run a single trace attack on UOV using the ChipWhisperer Setup with an STM32F3 Target Board. For the attack to be successful, we need 256 reference traces (possibly from a profiling device) and one attack trace (from the target device). The attached folders allow you to either generate the traces by yourself or to work with those we provide, in case you do not have the CW Setup at hand or just want to execute the attack quickly. Please consider the following folders:

Demonstration of the Attack

For a detailed description of the attack, please read the paper.

The script DPA_Recon.py contains the attack.

The script simulate_noisy_HW_measure.py contains a simulated attack, that recoveres the vinegar variables from the Hamming weights of certain products in the signing process. The noise level of the simulated Hamming weight measurements can be adjusted.

Licenses

Code in this repository that does not indicate otherwise is placed in the public domain.

For the third party code see their licenses: