An Improved Principal Component Analysis for Side-Channel Attacks

被引:1
|
作者
Bai, Haoming [1 ]
Gao, Hongling [2 ]
Yu, Shan [2 ]
Zhai, Teng [2 ]
Ma, Ziyang [2 ]
Guo, Qingshuai [2 ]
机构
[1] Inst Telecommun Sci & Technol, Beijing, Peoples R China
[2] Minist Ind & Informat Technol, China Software Testing Ctr, Integrated Circuit & Reliabil Evaluat Engn Techno, Software & Integrated Circuit Promot Ctr, Beijing, Peoples R China
关键词
side-channel attacks (SCAs); principal component analysis (PCA); data compression; correlation power analysis (CPA); power traces;
D O I
10.1109/ICICN56848.2022.10006485
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel attacks (SCAs) often need to collect a lot of power consumption data, and it takes a great deal of time to crack the secret key through these data. Ordinary principal component analysis (PCA) compression techniques consume a lot of time when processing power traces containing a large number of sample points. In this paper, two improved algorithms, absolute value integration PCA (APCA) and maximum value extraction PCA (MPCA), are proposed to optimize PCA. Both can compress the original power traces to about 10%. Compared with PCA, their processing speed is significantly improved. The more sample points, the more obvious the improvement. And through experiments, it is proved that APCA has more advantages than MPCA in the convergence of partial guessing entropy (PGE).
引用
收藏
页码:343 / 348
页数:6
相关论文
共 50 条
  • [31] A Survey of Side-Channel Attacks on Caches and Countermeasures
    Yangdi Lyu
    Prabhat Mishra
    Journal of Hardware and Systems Security, 2018, 2 (1) : 33 - 50
  • [32] Side-Channel Attacks on Shared Search Indexes
    Wang, Liang
    Grubbs, Paul
    Lu, Jiahui
    Bindschaedler, Vincent
    Cash, David
    Ristenpart, Thomas
    2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 673 - 692
  • [33] How to Compare Profiled Side-Channel Attacks?
    Standaert, Francois-Xavier
    Koeune, Francois
    Schindler, Werner
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 485 - +
  • [34] On the Feasibility of Side-Channel Attacks in a Virtualized Environment
    Vateva-Gurova, Tsvetoslava
    Luna, Jesus
    Pellegrino, Giancarlo
    Suri, Neeraj
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 319 - 339
  • [35] On the Correctness of an Approach against Side-Channel Attacks
    Wang, Peng
    Feng, Dengguo
    Wu, Wenling
    Zhang, Liting
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 336 - +
  • [36] Side-Channel Expectation-Maximization Attacks
    Béguinot, Julien
    Cheng, Wei
    Guilley, Sylvain
    Rioul, Olivier
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 774 - 799
  • [37] Side-Channel Attacks and Machine Learning Approach
    Levina, Alia
    Sleptsova, Daria
    Zaitsev, Oleg
    2016 18TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION AND SEMINAR ON INFORMATION SECURITY AND PROTECTION OF INFORMATION TECHNOLOGY (FRUCT-ISPIT), 2016, : 181 - 186
  • [38] A tutorial on physical security and side-channel attacks
    Koeune, F
    Standaert, FX
    FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 78 - 108
  • [39] SonarSnoop: active acoustic side-channel attacks
    Cheng, Peng
    Bagci, Ibrahim Ethem
    Roedig, Utz
    Yan, Jeff
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (02) : 213 - 228
  • [40] Wireless Charging Power Side-Channel Attacks
    La Cour, Alexander S.
    Afridi, Khurram K.
    Suh, G. Edward
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 651 - 665