Feed-Forward Back-Propagation Neural Networks in Side-Channel Information Characterization

被引:5
作者
Saeedi, E. [1 ]
Hossain, M. S. [1 ]
Kong, Y. [1 ]
机构
[1] Macquarie Univ, Dept Elect Engn, Sydney, NSW 2109, Australia
关键词
Side-channel attacks; multi-class classification; neural networks; principal components analysis; elliptic curve cryptography; ALGORITHM;
D O I
10.1142/S0218126619500038
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The safety of cryptosystems, mainly based on algorithmic improvement, is still vulnerable to side-channel attacks (SCA) based on machine learning. Multi-class classification based on neural networks and principal components analysis (PCA) can be powerful tools for pattern recognition and classification of side-channel information. In this paper, an experimental investigation was conducted to explore the efficiency of various architectures of feed-forward back-propagation (FFBP) neural networks and PCA against side-channel attacks. The experiment is performed on the data leakage of an FPGA implementation of elliptic curve cryptography (ECC). Our results show that the proposed method is a promising method for SCA with an overall accuracy of 88% correct classification.
引用
收藏
页数:18
相关论文
共 33 条
  • [1] Backes M., 2010, USENIX SECURITY S, P307
  • [2] Bartkewitz Timo, 2012, Smart Card Research and Advanced Applications. 11th International Conference (CARDIS 2012). Revised Selected Papers, P263, DOI 10.1007/978-3-642-37288-9_18
  • [3] 1ST-ORDER AND 2ND-ORDER METHODS FOR LEARNING - BETWEEN STEEPEST DESCENT AND NEWTON METHOD
    BATTITI, R
    [J]. NEURAL COMPUTATION, 1992, 4 (02) : 141 - 166
  • [4] BISHOP C. M., 2006, Pattern recognition and machine learning, DOI [DOI 10.1117/1.2819119, 10.1007/978-0-387-45528-0]
  • [5] Blake I.F., 1999, ELLIPTIC CURVES CRYP
  • [6] Multiagent learning using a variable learning rate
    Bowling, M
    Veloso, M
    [J]. ARTIFICIAL INTELLIGENCE, 2002, 136 (02) : 215 - 250
  • [7] Cybenko G., 1989, Mathematics of Control, Signals, and Systems, V2, P303, DOI 10.1007/BF02551274
  • [8] Da Rolt Jean, 2012, Constructive Side-Channel Analysis and Secure Design. Proceedings Third International Workshop, COSADE 2012, P89, DOI 10.1007/978-3-642-29912-4_8
  • [9] Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems
    De Mulder, E.
    Oers, S. B.
    Preneel, B.
    Verbauwhede, I.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (5-6) : 367 - 382
  • [10] De Mulder E, 2005, EUROCON 2005: THE INTERNATIONAL CONFERENCE ON COMPUTER AS A TOOL, VOL 1 AND 2 , PROCEEDINGS, P1879