An Unsupervised Learning Model to Perform Side Channel Attack

作者: Jung-Wei Chou , Min-Huang Chu , Yi-Lin Tsai , Yun Jin , Chen-Mou Cheng

DOI: 10.1007/978-3-642-37453-1_34

关键词:

摘要: This paper proposes a novel unsupervised learning approach for Power Analysis – form of side channel attack in Cryptanalysis. Different from existing works that exploit supervised framework to solve this problem, our method does not require any labeled pairs, which contains information the {X,Y}={key, power-trace}, but is still capable deciphering secret key accurately. Besides proposing regression-based, purpose, we further propose an enhanced model through exploiting dependency bits between different sub-processes during encryption process obtain accurate results more efficient way. Our experiment shows proposed outperforms state-of-the-art non-learning based decipherment methods significantly.

参考文章(21)
Régis Bevan, Erik Knudsen, Ways to enhance differential power analysis international conference on information security and cryptology. pp. 327- 342 ,(2002) , 10.1007/3-540-36552-4_23
Computer Security — ESORICS 98 Springer Berlin Heidelberg. ,(1998) , 10.1007/BFB0055851
Manfred Pinkal, Markus Dürmuth, Caroline Sporleder, Sebastian Gerling, Michael Backes, Acoustic side-channel attacks on printers usenix security symposium. pp. 20- 20 ,(2010)
Thanh-Ha Le, Jessy Clédière, Cécile Canovas, Bruno Robisson, Christine Servière, Jean-Louis Lacoume, A proposition for correlation power analysis enhancement cryptographic hardware and embedded systems. pp. 174- 186 ,(2006) , 10.1007/11894063_14
Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, Pankaj Rohatgi, The EM Side-Channel(s) cryptographic hardware and embedded systems. pp. 29- 45 ,(2002) , 10.1007/3-540-36400-5_4
Eric Brier, Christophe Clavier, Francis Olivier, Correlation Power Analysis with a Leakage Model Lecture Notes in Computer Science. pp. 16- 29 ,(2004) , 10.1007/978-3-540-28632-5_2
Paul C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems international cryptology conference. ,vol. 1109, pp. 104- 113 ,(1996) , 10.1007/3-540-68697-5_9
John Kelsey, Bruce Schneier, David Wagner, Chris Hall, Side channel cryptanalysis of product ciphers Journal of Computer Security. ,vol. 8, pp. 141- 158 ,(2000) , 10.3233/JCS-2000-82-304
Yuichi KOMANO, Hideo SHIMIZU, Shinichi KAWAMURA, BS-CPA : Built-In Determined Sub-Key Correlation Power Analysis IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. ,vol. 93, pp. 1632- 1638 ,(2010) , 10.1587/TRANSFUN.E93.A.1632
T.S. Messerges, E.A. Dabbish, R.H. Sloan, Examining smart-card security under the threat of power analysis attacks IEEE Transactions on Computers. ,vol. 51, pp. 541- 552 ,(2002) , 10.1109/TC.2002.1004593