A Multiple Sieve Approach Based on Artificial Intelligent Techniques and Correlation Power Analysis

Author:

Ding Yaoling1ORCID,Zhu Liehuang2,Wang An1,Li Yuan2,Wang Yongjuan3,Yiu Siu Ming4,Gai Keke2

Affiliation:

1. School of Computer Science and Technology, Beijing Institute of Technology and State Key Laboratory of Cryptology, Beijing, China

2. School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China

3. Institute of Cyberspace Security, Information Engineering University, Zhengzhou, China

4. Department of Computer Science, The University of Hong Kong, Hong Kong, China

Abstract

Side-channel analysis achieves key recovery by analyzing physical signals generated during the operation of cryptographic devices. Power consumption is one kind of these signals and can be regarded as a multimedia form. In recent years, many artificial intelligence technologies have been combined with classical side-channel analysis methods to improve the efficiency and accuracy. A simple genetic algorithm was employed in Correlation Power Analysis (CPA) when apply to cryptographic algorithms implemented in parallel. However, premature convergence caused failure in recovering the whole key, especially when plenty of large S-boxes were employed in the target primitive, such as in the case of AES. In this article, we investigate the reason of premature convergence and propose a Multiple Sieve Method (MS-CPA), which overcomes this problem and reduces the number of traces required in correlation power analysis. Our method can be adjusted to combine with key enumeration algorithms and further improves the efficiency. Simulation experimental results depict that our method reduces the required number of traces by and , compared to classic CPA and the Simple-Genetic-Algorithm-based CPA (SGA-CPA), respectively, when the success rate is fixed to . Real experiments performed on SAKURA-G confirm that the number of traces required for recovering the correct key in our method is almost equal to the minimum number that makes the correlation coefficients of correct keys stand out from the wrong ones and is much less than the numbers of traces required in CPA and SGA-CPA. When combining with key enumeration algorithms, our method has better performance. For the traces number being 200 (noise standard deviation ), the attacks success rate of our method is , which is much higher than the classic CPA with key enumeration ( success rate). Moreover, we adjust our method to work on that DPA contest v1 dataset and achieve a better result (40.04 traces) than the winning proposal (42.42 traces).

Funder

Beijing Natural Science Foundation

National Natural Science Foundation of China

National Cryptography Development Fund

Henan Key Laboratory of Network Cryptography Technology

Publisher

Association for Computing Machinery (ACM)

Subject

Computer Networks and Communications,Hardware and Architecture

Reference40 articles.

1. Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines

2. Tighter, faster, simpler side-channel security evaluations beyond computing power;Bernstein Daniel J.;IACR Cryptol. ePrint Arch.,2015

3. Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

4. Correlation Power Analysis with a Leakage Model

Cited by 6 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Efficient Multi-Byte Power Analysis Architecture Focusing on Bitwise Linear Leakage;ACM Transactions on Embedded Computing Systems;2024-09-11

2. SFGA-CPA: A Novel Screening Correlation Power Analysis Framework Based on Genetic Algorithm;Computers, Materials & Continua;2024

3. CoTree: A Side-Channel Collision Tool to Push the Limits of Conquerable Space;IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems;2023-12

4. Fault Probability Correlation Analysis Based on Secondary Filtering;IEEE Access;2023

5. Correlation Power Analysis and Protected Implementation on Lightweight Block Cipher FESH;2022 IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS);2022-05

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3