Abstract

This paper focuses on electromagnetic information security in communication systems. Classical correlation electromagnetic analysis (CEMA) is known as a powerful way to recover the cryptographic algorithm’s key. In the classical method, only one byte of the key is used while the other bytes are considered as noise, which not only reduces the efficiency but also is a waste of information. In order to take full advantage of useful information, multiple bytes of the key are used. We transform the key into a multidimensional form, and each byte of the key is considered as a dimension. The problem of the right key searching is transformed into the problem of optimizing correlation coefficients of key candidates. The particle swarm optimization (PSO) algorithm is particularly more suited to solve the optimization problems with high dimension and complex structure. In this paper, we applied the PSO algorithm into CEMA to solve multidimensional problems, and we also add a mutation operator to the optimization algorithm to improve the result. Here, we have proposed a multibyte correlation electromagnetic analysis based on particle swarm optimization. We verified our method on a universal test board that is designed for research and development on hardware security. We implemented the Advanced Encryption Standard (AES) cryptographic algorithm on the test board. Experimental results have shown that our method outperforms the classical method; it achieves approximately 13.72% improvement for the corresponding case.

Highlights

  • With the rapid development of 5th generation wireless systems (5G), more and more intelligent devices are connected to the Internet

  • These unintentional electromagnetic radiation could be used to recover the important information, even if they do not exceed the limits of the electromagnetic compatibility (EMC) regulation [1], which poses a threat to the information security

  • In this paper, combining the advantages of multiple bytes of the key and PSO algorithm, we propose a multibyte correlation electromagnetic analysis based on particle swarm optimization to recover the cryptographic devices’ key

Read more

Summary

Introduction

With the rapid development of 5th generation wireless systems (5G), more and more intelligent devices are connected to the Internet. It is well known that the electromagnetic (EM) signals will be radiated unintentionally when data are processing in these devices. These unintentional electromagnetic radiation could be used to recover the important information, even if they do not exceed the limits of the electromagnetic compatibility (EMC) regulation [1], which poses a threat to the information security. A display image was reconstructed based on the measured time changes in the electromagnetic radiation carrying the signals for drawing the display on touch screen devices such as tablets and smart phones [7]. On the field of electromagnetic information security, we study the threats of information leakage through electromagnetic radiation that can be used to compromise commercial devices and equipment.

Related Works
Cryptographic Algorithm
Experimental Results
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call