SEAMS: A Symmetric Encryption Algorithm Modification System to Resist Power Based Side Channel Attacks

被引:0
作者
Pathirana, K. P. A. P. [1 ]
Lankarathne, L. R. M. O. [1 ]
Hangawaththa, N. H. A. D. A. [1 ]
Abeywardena, K. Y. [2 ]
Kuruwitaarachchi, N. [2 ]
机构
[1] Sri Lanka Inst Informat Technol, Dept Informat Technol, Malabe, Sri Lanka
[2] Sri Lanka Inst Informat Technol, Dept Informat Syst Engn, Malabe, Sri Lanka
来源
INTELLIGENT COMPUTING, VOL 2 | 2019年 / 857卷
关键词
Cryptography; Encryption; Side channel attacks; Machine learning; Power analysis;
D O I
10.1007/978-3-030-01177-2_70
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Side channel attacks which examine physical characteristics of a cryptographic algorithm, are getting much more popular in present days since it is easier to mount an attack in a short time with only a few hundred dollars' worth of devices. Sensitive information of a cryptographic module can be easily identified by evaluating the side channel information, such as power consumption, heat and electromagnetic emissions that outputs from the cryptographic device. This creates a huge impact on the security of the cryptographic modules as it is an efficient technique to break cryptographic algorithms by analyzing the patterns of the side channel information without having any specialized knowledge in cryptography. The solution proposed in this paper is an algorithm modification system for symmetric algorithms in order to mitigate side channel attacks. This is achieved by injecting randomness to the algorithm following a comprehensive analysis of power fluctuations that outputs from a given algorithm. In the proposed solution, a hardware device tracks down the patterns in power consumption and analyze those meter readings by utilizing machine learning techniques. As a result of this analysis, it identifies the pattern generating source code positions. System will add random code fragments in to the identified positions in the algorithm without altering the output in order to resist side channel attacks.
引用
收藏
页码:965 / 976
页数:12
相关论文
共 50 条
  • [21] A Randomized Switched-Mode Voltage Regulation System for IoT Edge Devices to Defend Against Power Analysis based Side Channel Attacks
    Khan, Mohd
    Chen, Yu
    19TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2021), 2021, : 1771 - 1776
  • [22] Effect of Aging on PUF Modeling Attacks based on Power Side-Channel Observations
    Kroeger, Trevor
    Cheng, Wei
    Guilley, Sylvain
    Danger, Jean-Luc
    Karimi, Naghmeh
    PROCEEDINGS OF THE 2020 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2020), 2020, : 454 - 459
  • [23] RIJID: Random code injection to mask power analysis based side channel attacks
    Ambrose, Jude Angelo
    Ragel, Roshan G.
    Parameswaran, Sri
    2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, : 489 - +
  • [24] FPGA CENTRIC ATTENTION BASED DEEP LEARNING NETWORK EVOKED CHAOTIC ENCRYPTION TO MITIGATE SIDE CHANNEL ATTACKS
    Karthikeyan, Mani
    Selvan, Vediappan Ponniyin
    COMPTES RENDUS DE L ACADEMIE BULGARE DES SCIENCES, 2023, 76 (06): : 936 - 945
  • [25] A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel Attacks
    Li, Yang
    Wang, Shuang
    Wang, Zhibin
    Wang, Jian
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2017), 2018, 10728 : 51 - 69
  • [26] Isoga: An Isogeny-Based Quantum-Resist Searchable Encryption Scheme Against Keyword Guessing Attacks
    Fan, Qing
    He, Debiao
    Chen, Jianhua
    Peng, Cong
    Wang, Lianhai
    IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2101 - 2112
  • [27] A Randomization Based Computation of RSA to Resist Power Analysis Attacks
    Mahanta, Hridoy Jyoti
    Ahmed, Sibbir
    Khan, Ajoy Kumar
    PROCEEDINGS OF 2017 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO 2017), 2017, : 328 - 331
  • [28] Distance Based Leakage Alignment for Side Channel Attacks
    Yang, Wei
    Cao, Yuchen
    Zhou, Yongbin
    Zhang, Hailong
    Zhang, Qian
    IEEE SIGNAL PROCESSING LETTERS, 2016, 23 (04) : 419 - 423
  • [29] A New Symmetric Key Encryption Algorithm based on 2-d Geometry
    Chowdhury, Mohammad Jabed Morshed
    Pal, Tapas
    ICECT: 2009 INTERNATIONAL CONFERENCE ON ELECTRONIC COMPUTER TECHNOLOGY, PROCEEDINGS, 2009, : 541 - +
  • [30] Side-Channel Attacks Based on Collaborative Learning
    Liu, Biao
    Ding, Zhao
    Pan, Yang
    Li, Jiali
    Feng, Huamin
    DATA SCIENCE, PT 1, 2017, 727 : 549 - 557