Abstract

Side channel attack (SCA) is a class of crypt-analytic attacks for security evaluation of cryptographic and embedded microprocessor implementations. Among several SCA approaches, the correlation power analysis (CPA) is an efficient way to recover the secret key of the specific cryptographic algorithms running on the target devices such as embedded microprocessors. However, the evaluation process is time-consuming since a large number of traces are required to overcome the impact of noise. Hence, this paper proposes new methods to reduce the computation time by using Point of Interest (POI) extractor with the power trace biasing technique and the correlation distribution for the low complexity correlation power analysis (CPA). The theoretical explanations are provided and the experiments on different platforms such as ASCAD and RISC-V processor based databases are conducted to justify the proposed techniques. Especially, our experiments are performed with different protected schemes such as masking, hiding and combined hiding-masking techniques. The experimental results indicate that our proposed methods provide reliable results in comparison with the standard CPA. By using only a half of the power traces for taking the POIs, our first proposal not only decreases the execution time approximately by half but also enhances the success rate of the attack. Moreover, the second method based on power trace biasing technique is proposed in order to achieve better results and reduce the number of traces needed for selecting the POIs. With only 28.9% of given power traces needed, our second proposed technique reduces the execution time to only 2.6 times of the standard CPA.

Highlights

  • C RYPTOGRAPHY is one of the key solutions to provide confidentiality, integrity, and authenticity of data

  • - We propose a novel Point of Interest (POI) extractor based on both correlation distribution and power trace biasing technique called power trace biasing based P-correlation power analysis (CPA) (BP-CPA) in order to improve the probability of taking the correct samples and reduce the number of needed traces

  • This paper has proposed two novel POI extractors based on the power trace biasing technique and the correlation distribution to reduce the computation time

Read more

Summary

Introduction

C RYPTOGRAPHY is one of the key solutions to provide confidentiality, integrity, and authenticity of data. The implementation of cryptographic algorithms is facing various security threats. Side channel attack (SCA) is a realistic thread that maliciously deciphers the secret information by exploiting the side channel information such as the power consumption or electromagnetic radiation emanation [1]. SCA can be used as a promising tool for hardware Trojan detection [2], [3]. Utilizing unintentional leakage from a cryptographic device is critical in security evaluation for cryptographic implementations. Several evaluation/certification implementations are running SCA daily on devices under test to verify the security level. For a wide range of SCA applications, in this paper, we consider SCA as a tool of crypt-analysis which reveals the secret key and we refer to the word “attacker" for either attacker or evaluator in the rest of this paper

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.