%0 Conference Proceedings %T On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems %+ Télécom ParisTech %+ Morpho %+ Rutgers University [Camden] %A Souissi, Youssef %A Debande, Nicolas %A Mekki, Sami %A Guilley, Sylvain %A Maalaoui, Ali %A Danger, Jean-Luc %Z Part 8: Cryptography (Short Papers) %< avec comité de lecture %( Lecture Notes in Computer Science %B 6th International Workshop on Information Security Theory and Practice (WISTP) %C Egham, United Kingdom %Y Ioannis Askoxylakis %Y Henrich C. Pöhls %Y Joachim Posegga %I Springer %3 Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems %V LNCS-7322 %P 169-178 %8 2012-06-20 %D 2012 %R 10.1007/978-3-642-30955-7_15 %K Correlation Power Attack (CPA) %K Estimation theory %K Security metrics %K Spearman attack %Z Computer Science [cs]Conference papers %X In this paper, we answer the question of what are the necessary conditions under which Correlation Power Attack (CPA), that essentially targets embedded cryptographic implementations, is optimal with regards to attacks that exploit the same leakage model. For this purpose, we offer an in-depth theoretical study which aims at determining the conditions under which the Pearson correlation coefficient is maximized. Moreover, we propose theoretical metrics to practically verify the validity of those conditions. Besides, we illustrate our theoretical study by an experiment on real electromagnetic traces acquired from a DES cryptographic implementation. %G English %Z TC 11 %Z WG 11.2 %2 https://inria.hal.science/hal-01534305/document %2 https://inria.hal.science/hal-01534305/file/978-3-642-30955-7_15_Chapter.pdf %L hal-01534305 %U https://inria.hal.science/hal-01534305 %~ INSTITUT-TELECOM %~ ENST %~ TELECOM-PARISTECH %~ PARISTECH %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-WISTP %~ IFIP-WG11-2 %~ IFIP-LNCS-7322 %~ LTCI %~ COMELEC %~ SSH