Revisiting System Noise in Side-Channel Attacks: Mutual Assistant SCA vs. Genetic Algorithm

被引:0
|
作者
Kudo, Rei [1 ]
Sugawara, Takeshi [1 ]
Sakiyama, Kazuo [1 ]
Hara-Azumi, Yuko [2 ]
Li, Yang [1 ]
机构
[1] Univ Electrocommun, Dept Informat, Tokyo, Japan
[2] Tokyo Inst Technol, Dept Commun & Comp Engn, Tokyo, Japan
关键词
side channel; CPA; parallel implementation; divide-and-conquer; POWER ANALYSIS;
D O I
10.1109/ASIANHOST53231.2021.9699725
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
For side-channel attacks (SCA) against parallel S-boxes such as AES, side-channel leakage that is not related to the targeted byte becomes a system noise for the key recovery of the target byte. With a recovered key byte for an S-box calculation, one can mitigate the corresponding system noise to assist the recovery of other key bytes. Following this idea, this paper proposes a mutual assistant side-channel attack (MA-SCA) that improves SCA efficiency using partially recovered keys. MA-SCA is inspired by the simple genetic algorithm CPA (SGA-CPA) and multiple sieve CPA (MS-CPA) attack that combines genetic algorithm with correlation power analysis. In genetic algorithm-based CPA, the partial key pieces are randomly combined and sieved repeatedly to solve the optimization problem of the correlation coefficient. In MA-SCA, the partial key pieces are combined in an organized manner to achieve a compact balance between the computation and the data complexities. In the evaluation, compared with MS-CPA, mutual MA-CPA archived a similar success rate using only 1-5% of the calculation. This work also discusses the boundaries of SCA improvement by reducing system noise.
引用
收藏
页数:6
相关论文
共 38 条
  • [21] Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9
    Zhang, Qi
    Wang, An
    Niu, Yongchuan
    Shang, Ning
    Xu, Rixin
    Zhang, Guoshuang
    Zhu, Liehuang
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [22] Low-Cost Full Correlated-Power-Noise Generator to Counteract Side-Channel Attacks
    Tena-Sanchez, Erica
    Potestad-Ordonez, Francisco Eugenio
    Zuniga-Gonzalez, Virginia
    Acosta, Antonio J.
    APPLIED SCIENCES-BASEL, 2025, 15 (06):
  • [23] CA-SCA: Non-Profiled Deep Learning-Based Side-Channel Attacks by Using Cluster Analysis
    Fukuda, Yuta
    Yoshida, Kota
    Fujino, Takeshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2025, E108A (03) : 227 - 241
  • [24] A State Encoding Methodology for Side-Channel Security vs. Power Trade-off Exploration
    Agrawal, Richa
    Borowczak, Mike
    Vemuri, Ranga
    2019 32ND INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2019 18TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2019, : 70 - 75
  • [25] Side-channel attacks on HIGHT with reduced masked rounds suitable for the protection of multimedia computing system
    Lee, Yuseop
    Kim, Jongsung
    Hong, Seokhie
    MULTIMEDIA TOOLS AND APPLICATIONS, 2012, 56 (02) : 267 - 280
  • [26] Side-channel attacks on HIGHT with reduced masked rounds suitable for the protection of multimedia computing system
    Yuseop Lee
    Jongsung Kim
    Seokhie Hong
    Multimedia Tools and Applications, 2012, 56 : 267 - 280
  • [27] An improved LEA block encryption algorithm to prevent side-channel attack in the IoT system
    Choi, Jaehak
    Kim, Youngseop
    2016 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA), 2016,
  • [28] Island-based Random Dynamic Voltage Scaling vs ML-Enhanced Power Side-Channel Attacks
    Chen, Dake
    Goins, Christine
    Waugaman, Maxwell
    Dimou, Georgios D.
    Beerel, Peter A.
    PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2023, GLSVLSI 2023, 2023, : 333 - 338
  • [29] SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-quantum Encryption Schemes
    Guo, Qian
    Nabokov, Denis
    Nilsson, Alexander
    Johansson, Thomas
    ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT IV, 2023, 14441 : 203 - 236
  • [30] A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks
    David, Liron
    Wool, Avishai
    TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 311 - 327