Side-channel attacks and learning-vector quantization

被引:0
作者
Ehsan Saeedi
Yinan Kong
Md. Selim Hossain
机构
[1] Macquarie University,Department of Engineering
来源
Frontiers of Information Technology & Electronic Engineering | 2017年 / 18卷
关键词
Side-channel attacks; Elliptic curve cryptography; Multi-class classification; Learning vector quantization; TP309;
D O I
暂无
中图分类号
学科分类号
摘要
The security of cryptographic systems is a major concern for cryptosystem designers, even though cryptography algorithms have been improved. Side-channel attacks, by taking advantage of physical vulnerabilities of cryptosystems, aim to gain secret information. Several approaches have been proposed to analyze side-channel information, among which machine learning is known as a promising method. Machine learning in terms of neural networks learns the signature (power consumption and electromagnetic emission) of an instruction, and then recognizes it automatically. In this paper, a novel experimental investigation was conducted on field-programmable gate array (FPGA) implementation of elliptic curve cryptography (ECC), to explore the efficiency of side-channel information characterization based on a learning vector quantization (LVQ) neural network. The main characteristics of LVQ as a multi-class classifier are that it has the ability to learn complex non-linear input-output relationships, use sequential training procedures, and adapt to the data. Experimental results show the performance of multi-class classification based on LVQ as a powerful and promising approach of side-channel data characterization.
引用
收藏
页码:511 / 518
页数:7
相关论文
共 33 条
  • [1] Bartkewitz T.(2013)Efficient template attacks based on probabilistic multi-class support vector machines LNCS 7771 263-276
  • [2] Lemke-Rust K.(1989)Approximation by superpositions of a sigmoidal function Math. Contr. Signals Syst. 2 303-314
  • [3] Cybenko G.(1992)EEG classification by learning vector quantization Biomed. Eng. 37 303-309
  • [4] Flotzinger D.(1979)Asymptotically optimal block quantization IEEE Trans. Inform. Theory 25 373-380
  • [5] Kalcher J.(2002)Address-bit differential power analysis of cryptographic schemes OK-ECDH and OK-ECDSA LNCS 2523 129-143
  • [6] Pfurtscheller G.(1987)Elliptic curve cryptosystems Math. Comput. 48 203-209
  • [7] Gersho A.(1988)An introduction to neural computing Neur. Networks 1 3-16
  • [8] Itoh K.(2011)A robust remote user authentication scheme using smart card Inform. Technol. Contr. 40 236-245
  • [9] Izu T.(2014)Security flaws in two improved remote user authentication schemes using smart cards Int. J. Commun. Syst. 27 2215-2227
  • [10] Takenaka M.(1996)Automated feature selection with a distinction sensitive learning vector quantizer Neurocomputing 11 19-29