SEAMS: A Symmetric Encryption Algorithm Modification System to Resist Power Based Side Channel Attacks

被引:0
作者
Pathirana, K. P. A. P. [1 ]
Lankarathne, L. R. M. O. [1 ]
Hangawaththa, N. H. A. D. A. [1 ]
Abeywardena, K. Y. [2 ]
Kuruwitaarachchi, N. [2 ]
机构
[1] Sri Lanka Inst Informat Technol, Dept Informat Technol, Malabe, Sri Lanka
[2] Sri Lanka Inst Informat Technol, Dept Informat Syst Engn, Malabe, Sri Lanka
来源
INTELLIGENT COMPUTING, VOL 2 | 2019年 / 857卷
关键词
Cryptography; Encryption; Side channel attacks; Machine learning; Power analysis;
D O I
10.1007/978-3-030-01177-2_70
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Side channel attacks which examine physical characteristics of a cryptographic algorithm, are getting much more popular in present days since it is easier to mount an attack in a short time with only a few hundred dollars' worth of devices. Sensitive information of a cryptographic module can be easily identified by evaluating the side channel information, such as power consumption, heat and electromagnetic emissions that outputs from the cryptographic device. This creates a huge impact on the security of the cryptographic modules as it is an efficient technique to break cryptographic algorithms by analyzing the patterns of the side channel information without having any specialized knowledge in cryptography. The solution proposed in this paper is an algorithm modification system for symmetric algorithms in order to mitigate side channel attacks. This is achieved by injecting randomness to the algorithm following a comprehensive analysis of power fluctuations that outputs from a given algorithm. In the proposed solution, a hardware device tracks down the patterns in power consumption and analyze those meter readings by utilizing machine learning techniques. As a result of this analysis, it identifies the pattern generating source code positions. System will add random code fragments in to the identified positions in the algorithm without altering the output in order to resist side channel attacks.
引用
收藏
页码:965 / 976
页数:12
相关论文
共 50 条
[41]   Neural Network-Based Side Channel Attacks and Countermeasures [J].
Serpanos, Dimitrios ;
Yang, Shengqi ;
Wolf, Marilyn .
PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2020,
[42]   Revisiting System Noise in Side-Channel Attacks: Mutual Assistant SCA vs. Genetic Algorithm [J].
Kudo, Rei ;
Sugawara, Takeshi ;
Sakiyama, Kazuo ;
Hara-Azumi, Yuko ;
Li, Yang .
PROCEEDINGS OF THE 2021 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2021,
[43]   Review of Side Channel Attacks and Countermeasures of FPGA Based Systems [J].
Koh, Jun Yu ;
Kumar, T. Nandha .
19TH IEEE STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT (SCORED 2021), 2021, :102-107
[44]   Variational Mode Decomposition Based Denoising in Side Channel Attacks [J].
Ai, Juan ;
Wang, Zhu ;
Zhou, Xinping ;
Ou, Changhai .
2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, :1683-1687
[45]   CSCAD: An Adaptive LightGBM Algorithm to Detect Cache Side-Channel Attacks [J].
Hao, Sirui ;
He, Junjiang ;
Li, Wenshan ;
Li, Tao ;
Yang, Geying ;
Fang, Wenbo ;
Chen, Wanying .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (01) :695-709
[46]   Side-Channel Attacks Based on Multi-Loss Regularized Denoising AutoEncoder [J].
Hu, Fanliang ;
Shen, Jian ;
Vijayakumar, Pandi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 :2051-2065
[47]   Mitigating Timing-Based NoC Side-Channel Attacks With LLC Remapping [J].
Kar, Anurag ;
Liu, Xueyang ;
Kim, Yonghae ;
Saileshwar, Gururaj ;
Kim, Hyesoon ;
Krishna, Tushar .
IEEE COMPUTER ARCHITECTURE LETTERS, 2023, 22 (01) :53-56
[48]   Securing Data From Side-Channel Attacks: A Graph Neural Network-Based Approach for Smartphone-Based Side Channel Attack Detection [J].
Abbas, Sidra ;
Ojo, Stephen ;
Bouazzi, Imen ;
Avelino Sampedro, Gabriel ;
Al Hejaili, Abdullah ;
Almadhor, Ahmad S. ;
Kulhanek, Rastislav .
IEEE ACCESS, 2024, 12 :138904-138920
[49]   Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks [J].
Azouaoui M. ;
Kuzovkova Y. ;
Schneider T. ;
van Vredendaal C. .
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04) :372-396
[50]   Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series [J].
Moradi, Amir ;
Schneider, Tobias .
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2016, 2016, 9689 :71-87