Enhancing non-profiled side-channel attacks by time-frequency analysis

被引:1
|
作者
Jin, Chengbin [1 ,2 ]
Zhou, Yongbin [1 ,3 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Nanjing Univ Sci & Technol, Sch Cyber Sci & Engn, Nanjing, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Correlation power analysis; Side-channel analysis; Proposed attack framework; Wavelet scatter transform; Short-time fourier transform; MODEL;
D O I
10.1186/s42400-023-00149-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel analysis (SCA) has become an increasing important method to assess the physical security of cryptographic systems. In the process of SCA, the number of attack data directly determines the performance of SCA. With sufficient attack data, the adversary can achieve a successful SCA. However, in reality, the cryptographic device may be protected with some countermeasures to limit the number of encryptions using the same key. In this case, the adversary cannot use casual numbers of data to perform SCA. The performance of SCA will be severely dropped if the attack traces are insufficient. In this paper, we introduce wavelet scatter transform (WST) and short-time fourier transform (STFT) to non-profiled side-channel analysis domains, to improve the performance of side-channel attacks in the context of insufficient data. We design a practical framework to provide suitable parameters for WST/STFT-based SCA. Using the proposed method, the WST/STFT-based SCA method can significantly enhance the performance and robustness of non-profiled SCA. The practical attacks against four public datasets show that the proposed method is able to achieve more robust performance. Compared with the original correlation power analysis (CPA), the number of attack data can be reduced by 50-95%.
引用
收藏
页数:26
相关论文
共 50 条
  • [31] Combined Side-Channel Attacks
    Elaabid, M. Abdelaziz
    Meynard, Olivier
    Guilley, Sylvain
    Danger, Jean-Luc
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 175 - 190
  • [32] Side-channel attacks on smartcards
    NGS Software
    Netw. Secur., 2006, 12 (18-20):
  • [33] On the Detection of Side-Channel Attacks
    Vateva-Gurova, Tsvetoslava
    Suri, Neeraj
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 185 - 186
  • [34] Algebraic Side-Channel Attacks
    Renauld, Mathieu
    Standaert, Francois-Xavier
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 393 - 410
  • [35] Introduction to Side-Channel Attacks and Fault Attacks
    Li, Yang
    Chen, Mengting
    Wang, Jian
    2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2016, : 573 - 575
  • [36] Challenges in Deep Learning-Based Profiled Side-Channel Analysis
    Picek, Stjepan
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2019, 2019, 11947 : 9 - 12
  • [37] When Failure Analysis Meets Side-Channel Attacks
    Di-Battista, Jerome
    Courrege, Jean-Christophe
    Rouzeyre, Bruno
    Torres, Lionel
    Perdu, Philippe
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 188 - +
  • [38] An Improved Principal Component Analysis for Side-Channel Attacks
    Bai, Haoming
    Gao, Hongling
    Yu, Shan
    Zhai, Teng
    Ma, Ziyang
    Guo, Qingshuai
    2022 IEEE 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND NETWORKS (ICICN 2022), 2022, : 343 - 348
  • [39] Cross-Device Profiled Side-Channel Attacks using Meta-Transfer Learning
    Yu, Honggang
    Shan, Haoqi
    Panoff, Maximillian
    Jin, Yier
    2021 58TH ACM/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2021, : 703 - 708
  • [40] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414