Improving Efficiency of Key Enumeration Based on Side-Channel Analysis

被引:0
|
作者
Yang, Wei [1 ]
Fu, Anmin [1 ]
Zhang, Hailong [2 ]
Huang, Chanying [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
基金
中国国家自然科学基金;
关键词
Security evaluation; side-channel analysis; key enumeration; key rank; multi-channel leakages;
D O I
10.1109/TrustCom50675.2020.00021
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel analysis (SCA) is usually used for analyzing the side-channel resistance of a crypto device. However, it does not mean "practical secure" when a SCA attack fails since SCA only provides a success or failure conclusion. On the basis of the SCA data about scores and ranks of all candidates for each subkey, it is still possible to apply key enumeration (KE) algorithms to search the correct master key at an affordable overhead. Nevertheless, the efficiency of KE is limited by the SCA data in essence. To address the issue, we proposed two methods to exploit the SCA data and Riemann integral of the rank curves of all subkey candidates to update each correct subkey rank before carrying out KE. We applied the proposed methods for different crypto implementations running on different devices to verify their performance. Experimental studies for both mono-channel and multi-channel leakages verified that the proposed methods were effective in improving the efficiency of KE to recover the correct key. The proposed methods are designed for processing the SCA data and can be deemed as a preliminary before executing KE. The work of this paper bridges the gap between SCA and KE.
引用
收藏
页码:54 / 61
页数:8
相关论文
共 50 条
  • [41] Use of simulators for side-channel analysis
    Veshchikov, Nikita
    Guilley, Sylvain
    2017 2ND IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW), 2017, : 104 - 112
  • [42] Improving IIoT security: Unveiling threats through advanced side-channel analysis
    He, Dalin
    Wang, Huanyu
    Deng, Tuo
    Liu, Jishi
    Wang, Junnian
    COMPUTERS & SECURITY, 2025, 148
  • [43] A Hardware Trojan Detection Method Based on Side-channel Analysis
    Wang Xiaohan
    Li Xiongwei
    Xu Lu
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 : 1042 - 1047
  • [44] Side-channel analysis attacks based on deep learning network
    Yu Ou
    Lang Li
    Frontiers of Computer Science, 2022, 16
  • [45] Strength in numbers: Improving generalization with ensembles in machine learning-based profiled side-channel analysis
    Perin G.
    Chmielewski Ł.
    Picek S.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (04): : 337 - 364
  • [46] Hilbert Transform based Vertical Preprocessing for Side-Channel Analysis
    Cao, Yuchen
    Zhou, Yongbin
    Zhang, Hailong
    Yang, Wei
    2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [47] Side-channel analysis attacks based on deep learning network
    Yu OU
    Lang LI
    Frontiers of Computer Science, 2022, 16 (02) : 37 - 47
  • [48] Side-channel analysis attacks based on deep learning network
    Ou, Yu
    Li, Lang
    FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (02)
  • [49] Side-Channel Power Analysis Based on SA-SVM
    Zhang, Ying
    He, Pengfei
    Gan, Han
    Zhang, Hongxin
    Fan, Pengfei
    APPLIED SCIENCES-BASEL, 2023, 13 (09):
  • [50] Overview of Machine Learning Based Side-Channel Analysis Methods
    Jap, Dirmanto
    Breier, Jakub
    2014 14TH INTERNATIONAL SYMPOSIUM ON INTEGRATED CIRCUITS (ISIC), 2014, : 38 - 41