SEAMS: A Symmetric Encryption Algorithm Modification System to Resist Power Based Side Channel Attacks

被引:0
作者
Pathirana, K. P. A. P. [1 ]
Lankarathne, L. R. M. O. [1 ]
Hangawaththa, N. H. A. D. A. [1 ]
Abeywardena, K. Y. [2 ]
Kuruwitaarachchi, N. [2 ]
机构
[1] Sri Lanka Inst Informat Technol, Dept Informat Technol, Malabe, Sri Lanka
[2] Sri Lanka Inst Informat Technol, Dept Informat Syst Engn, Malabe, Sri Lanka
来源
INTELLIGENT COMPUTING, VOL 2 | 2019年 / 857卷
关键词
Cryptography; Encryption; Side channel attacks; Machine learning; Power analysis;
D O I
10.1007/978-3-030-01177-2_70
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Side channel attacks which examine physical characteristics of a cryptographic algorithm, are getting much more popular in present days since it is easier to mount an attack in a short time with only a few hundred dollars' worth of devices. Sensitive information of a cryptographic module can be easily identified by evaluating the side channel information, such as power consumption, heat and electromagnetic emissions that outputs from the cryptographic device. This creates a huge impact on the security of the cryptographic modules as it is an efficient technique to break cryptographic algorithms by analyzing the patterns of the side channel information without having any specialized knowledge in cryptography. The solution proposed in this paper is an algorithm modification system for symmetric algorithms in order to mitigate side channel attacks. This is achieved by injecting randomness to the algorithm following a comprehensive analysis of power fluctuations that outputs from a given algorithm. In the proposed solution, a hardware device tracks down the patterns in power consumption and analyze those meter readings by utilizing machine learning techniques. As a result of this analysis, it identifies the pattern generating source code positions. System will add random code fragments in to the identified positions in the algorithm without altering the output in order to resist side channel attacks.
引用
收藏
页码:965 / 976
页数:12
相关论文
共 50 条
  • [11] More Secure Internet of Things Using Robust Encryption Algorithms Against Side Channel Attacks
    Tawalbeh, Lo'ai A.
    Somani, Turki F.
    2016 IEEE/ACS 13TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2016,
  • [12] Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives
    Unterluggauer, Thomas
    Werner, Mario
    Mangard, Stefan
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 690 - 702
  • [13] Wireless Charging Power Side-Channel Attacks
    La Cour, Alexander S.
    Afridi, Khurram K.
    Suh, G. Edward
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 651 - 665
  • [14] Power Side Channel Attacks: Where Are We Standing?
    Taouil, Mottaqiallah
    Aljuffri, Abdullah
    Hamdioui, Said
    2021 16TH INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA (DTIS 2021), 2021,
  • [15] Anonymous Identity Based Broadcast Encryption against Continual Side Channel Attacks in the State Partition Model
    Yu, Qihong
    Li, Jiguo
    Ji, Sai
    APPLIED SCIENCES-BASEL, 2022, 12 (18):
  • [16] Remote Power Side- Channel Attacks on FPGAs
    Zhao, Mark
    Suh, G. Edward
    IEEE DESIGN & TEST, 2025, 42 (01) : 13 - 19
  • [17] Leakage-Resilient Public Key Encryption with Equality Test Resistant to Side-channel Attacks
    Tsai, Tung-tso
    Lin, Han-yu
    Chen, Yu-chi
    Chen, Yuan-chin
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2025, 41 (01) : 155 - 176
  • [18] Run-time Detection of Prime plus Probe Side-Channel Attack on AES Encryption Algorithm
    Mushtaq, Maria
    Akram, Ayaz
    Bhatti, Muhammad Khurram
    Bin Rais, Rao Naveed
    Lapotre, Vianney
    Gogniat, Guy
    2018 GLOBAL INFORMATION INFRASTRUCTURE AND NETWORKING SYMPOSIUM (GIIS), 2018,
  • [19] Temperature Impact on Remote Power Side-Channel Attacks on Shared FPGAs
    Glamocanin, Ognjen
    Bazaz, Hajira
    Payer, Mathias
    Stojilovic, Mirjana
    2023 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2023,
  • [20] Content based double encryption algorithm using symmetric key cryptography
    Chandra, Sourabh
    Mandal, Bidisha
    Alam, Sk Safikul
    Bhattacharyya, Siddhartha
    3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 : 1228 - 1234