{"title":"Two Dimensional SOST: Extract Multi-Dimensional Leakage for Side-Channel Analysis on Cryptosystems","authors":"Zheng Liu, Congming Wei, Shengjun Wen, Shaofei Sun, Yaoling Ding, Anzhou Wang","doi":"10.1109/CSP58884.2023.00008","DOIUrl":null,"url":null,"abstract":"In 2021, Perin et al. proposed a horizontal attack framework against elliptic curve scalar multiplication (ECSM) operation based on the work of Nascimento et al. Their framework consists roughly of three steps. First, they apply k-means on the iteration traces from multiple ECSM executions, then, the results of clustering are used to make a leakage metric trace by using sum-of-squared t-values (SOST), based on the leakage metric trace, the points of interest (POI) are selected. Second, they apply k-means on those POIs to get initial labels for the scalar bits, the accuracy of initial labels is only 52%. Third, wrong bits are corrected by using an iterative deep learning framework. Our work focus on improving the horizontal attack framework by replacing SOST with our proposed two dimensional SOST (2D-SOST) to improve the efficiency of POI selection under unsupervised context. 2D-SOST can extract leakage information between dimensions while SOST can only extract information on one dimension which limits its performance. By replacing SOST with 2D-SOST, our method improves the accuracy of clustering algorithm from an average of 58% to an average of 74%. We also simplified the framework used in original paper and finally recover scalar bits successfully under the configuration where the original paper can not.","PeriodicalId":255083,"journal":{"name":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSP58884.2023.00008","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In 2021, Perin et al. proposed a horizontal attack framework against elliptic curve scalar multiplication (ECSM) operation based on the work of Nascimento et al. Their framework consists roughly of three steps. First, they apply k-means on the iteration traces from multiple ECSM executions, then, the results of clustering are used to make a leakage metric trace by using sum-of-squared t-values (SOST), based on the leakage metric trace, the points of interest (POI) are selected. Second, they apply k-means on those POIs to get initial labels for the scalar bits, the accuracy of initial labels is only 52%. Third, wrong bits are corrected by using an iterative deep learning framework. Our work focus on improving the horizontal attack framework by replacing SOST with our proposed two dimensional SOST (2D-SOST) to improve the efficiency of POI selection under unsupervised context. 2D-SOST can extract leakage information between dimensions while SOST can only extract information on one dimension which limits its performance. By replacing SOST with 2D-SOST, our method improves the accuracy of clustering algorithm from an average of 58% to an average of 74%. We also simplified the framework used in original paper and finally recover scalar bits successfully under the configuration where the original paper can not.