Enhancing non-profiled side-channel attacks by time-frequency analysis

被引:1
|
作者
Jin, Chengbin [1 ,2 ]
Zhou, Yongbin [1 ,3 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Nanjing Univ Sci & Technol, Sch Cyber Sci & Engn, Nanjing, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Correlation power analysis; Side-channel analysis; Proposed attack framework; Wavelet scatter transform; Short-time fourier transform; MODEL;
D O I
10.1186/s42400-023-00149-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel analysis (SCA) has become an increasing important method to assess the physical security of cryptographic systems. In the process of SCA, the number of attack data directly determines the performance of SCA. With sufficient attack data, the adversary can achieve a successful SCA. However, in reality, the cryptographic device may be protected with some countermeasures to limit the number of encryptions using the same key. In this case, the adversary cannot use casual numbers of data to perform SCA. The performance of SCA will be severely dropped if the attack traces are insufficient. In this paper, we introduce wavelet scatter transform (WST) and short-time fourier transform (STFT) to non-profiled side-channel analysis domains, to improve the performance of side-channel attacks in the context of insufficient data. We design a practical framework to provide suitable parameters for WST/STFT-based SCA. Using the proposed method, the WST/STFT-based SCA method can significantly enhance the performance and robustness of non-profiled SCA. The practical attacks against four public datasets show that the proposed method is able to achieve more robust performance. Compared with the original correlation power analysis (CPA), the number of attack data can be reduced by 50-95%.
引用
收藏
页数:26
相关论文
共 50 条
  • [21] Differential Metric based Deep Learning Methodology for Non-Profiled Side Channel Analysis
    Vijayakanthi, Gonella
    Mohanty, Jaganath Prasad
    Swain, Ayas Kanta
    Mahapatra, Kamalakanta
    2021 IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2021), 2021, : 200 - 203
  • [22] Investigating profiled side-channel attacks against the DES key schedule
    Heyszl J.
    Miller K.
    Unterstein F.
    Schink M.
    Wagner A.
    Gieser H.
    Freud S.
    Damm T.
    Klein D.
    Kügler D.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (03): : 22 - 72
  • [23] Practical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM
    Kunihiro Kuroda
    Yuta Fukuda
    Kota Yoshida
    Takeshi Fujino
    Journal of Cryptographic Engineering, 2023, 13 : 427 - 442
  • [24] Practical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM
    Kuroda, Kunihiro
    Fukuda, Yuta
    Yoshida, Kota
    Fujino, Takeshi
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2023, 13 (04) : 427 - 442
  • [25] Profiled Side-Channel Analysis in the Efficient Attacker Framework
    Picek, Stjepan
    Heuser, Annelie
    Perin, Guilherme
    Guilley, Sylvain
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2021), 2022, 13173 : 44 - 63
  • [26] Convolutional Neural Networks for Profiled Side-Channel Analysis
    Hou, Shourong
    Zhou, Yujie
    Liu, Hongming
    RADIOENGINEERING, 2019, 28 (03) : 651 - 658
  • [27] Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
    Elaabid, M. Abdelaziz
    Guilley, Sylvain
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 243 - +
  • [28] Multi-Bit DDLA: Non-Profiled Deep Learning Side-Channel Attacks Using Multi-Bit Label against Hardware-Implemented AES
    Fukuda, Yuta
    Yoshida, Kota
    Fujino, Takeshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2025, E108A (03) : 215 - 226
  • [29] Efficient Profiled Side-Channel Analysis of Masked Implementations, Extended
    Bronchain, Olivier
    Durvaux, Francois
    Masure, Loic
    Standaert, Francois-Xavier
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 574 - 584
  • [30] Thwarting Side-Channel Attacks
    Edwards, Chris
    COMMUNICATIONS OF THE ACM, 2020, 63 (10) : 13 - 14