SFGA-CPA: A Novel Screening Correlation Power Analysis Framework Based on Genetic Algorithm

被引:0
作者
Liu, Jiahui [1 ,2 ]
Li, Lang [1 ,2 ]
Li, Di [1 ,2 ]
Ou, Yu [1 ,2 ]
机构
[1] Hengyang Normal Univ, Coll Comp Sci & Technol, Hengyang 421002, Peoples R China
[2] Hengyang Normal Univ, Hunan Prov Key Lab Intelligent Informat Proc & App, Hengyang 421002, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 79卷 / 03期
关键词
Side-channel analysis; correlation power analysis; genetic algorithm; crossover; mutation;
D O I
10.32604/cmc.2024.051613
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Correlation power analysis (CPA) combined with genetic algorithms (GA) now achieves greater attack efficiency and can recover all subkeys simultaneously. However, two issues in GA-based CPA still need to be addressed: key degeneration and slow evolution within populations. These challenges significantly hinder key recovery efforts. This paper proposes a screening correlation power analysis framework combined with a genetic algorithm, named SFGA-CPA, to address these issues. SFGA-CPA introduces three operations designed to exploit CPA characteristics: propagative operation, constrained crossover, and constrained mutation. Firstly, the propagative operation accelerates population evolution by maximizing the number of correct bytes in each individual. Secondly, the constrained crossover and mutation operations effectively address key degeneration by preventing the compromise of correct bytes. Finally, an intelligent search method is proposed to identify optimal parameters, further improving attack efficiency. Experiments were conducted on both simulated environments and real power traces collected from the SAKURA-G platform. In the case of simulation, SFGA-CPA reduces the number of traces by 27.3% and 60% compared to CPA based on multiple screening methods (MS-CPA) and CPA based on simple GA method (SGA-CPA) when the success rate reaches 90%. Moreover, real experimental results on the SAKURA-G platform demonstrate that our approach outperforms other methods.
引用
收藏
页码:4641 / 4657
页数:17
相关论文
共 29 条
[1]  
Acharya R.Y., 2023, IACR Trans. Cryptogr. Hardw. Embed. Syst, V2023, P401, DOI [10.46586/tches.v2023.i1.401-437, DOI 10.46586/TCHES.V2023.I1.401-437]
[2]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[3]   Deep learning for side-channel analysis and introduction to ASCAD database [J].
Benadjila, Ryad ;
Prouff, Emmanuel ;
Strullu, Remi ;
Cagli, Eleonora ;
Dumas, Cecile .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) :163-188
[4]   Dynastic Potential Crossover Operator [J].
Chicano, Francisco ;
Ochoa, Gabriela ;
Whitley, L. Darrell ;
Tinos, Renato .
EVOLUTIONARY COMPUTATION, 2022, 30 (03) :409-446
[5]   A Multiple Sieve Approach Based on Artificial Intelligent Techniques and Correlation Power Analysis [J].
Ding, Yaoling ;
Zhu, Liehuang ;
Wang, An ;
Li, Yuan ;
Wang, Yongjuan ;
Yiu, Siu Ming ;
Gai, Keke .
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 17 (02)
[6]   Research of CPA Attack Methods Based on Ant Colony Algorithm [J].
Duan, Xiaoyi ;
Li, You ;
Tong, Jianmin ;
Li, Xiuying ;
He, Siman ;
Zhang, Peishu .
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT I, 2021, 398 :270-286
[7]   SCENERY: a lightweight block cipher based on Feistel structure [J].
Feng, Jingya ;
Li, Lang .
FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (03)
[8]   Electromagnetic Analysis of Integrated On-Chip Sensing Loop for Side-Channel and Fault-Injection Attack Detection [J].
Ghosh, Archisman ;
Nath, Mayukh ;
Das, Debayan ;
Ghosh, Santosh ;
Sen, Shreyas .
IEEE MICROWAVE AND WIRELESS COMPONENTS LETTERS, 2022, 32 (06) :784-787
[9]  
Jasim K. F., 2021, Cihan Univ.-Erbil Sci. J., V5, P13
[10]   Side-channel analysis of a learning parity with physical noise processor [J].
Kamel, Dina ;
Bellizia, Davide ;
Bronchain, Olivier ;
Standaert, Francois-Xavier .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2021, 11 (02) :171-179