Xinping Zhou, Degang Sun, Zhu Wang, Changhai Ou, J. Ai, V. DeBrunner, Chonghua Wang
{"title":"基于自适应奇异值分解增强相关电磁分析的方法","authors":"Xinping Zhou, Degang Sun, Zhu Wang, Changhai Ou, J. Ai, V. DeBrunner, Chonghua Wang","doi":"10.1109/ISEMC.2016.7571638","DOIUrl":null,"url":null,"abstract":"Electromagnetic analysis in side channel attack exploits the information of electromagnetic radiation that leaks from the cryptographic devices when they are running. It's no-table because of its efficiency and easiness to perform. Correlation electromagnetic analysis (CEMA) is of the most effective means in electromagnetic analysis. However, the efficiency of traditional CEMA is limited by some insignificant' electromagnetic traces. It is necessary to select the helpful subset of the electromagnetic traces for analysis rather than using the whole electromagnetic traces set to improve the efficiency. In this paper, we first give an proposition about the CEMA and prove it by mathematical theory. This proposition illustrates the feasibility of selecting electromagnetic traces. Then we propose a method that is based on Singular Value Decomposition to select electromagnetic traces. This method is adaptive and doesn't need any external parameter. Besides, this method is useful for analyzing both unprotected implementation and masked implementation. We carry out the practical experiments by our SVD-CEMA and CEMA in the same scenario. The experimental results verify that the key-recovery efficiency of our method is higher than CEMA.","PeriodicalId":326016,"journal":{"name":"2016 IEEE International Symposium on Electromagnetic Compatibility (EMC)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An adaptive singular value decomposition-based method to enhance correlation electromagnetic analysis\",\"authors\":\"Xinping Zhou, Degang Sun, Zhu Wang, Changhai Ou, J. Ai, V. DeBrunner, Chonghua Wang\",\"doi\":\"10.1109/ISEMC.2016.7571638\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Electromagnetic analysis in side channel attack exploits the information of electromagnetic radiation that leaks from the cryptographic devices when they are running. It's no-table because of its efficiency and easiness to perform. Correlation electromagnetic analysis (CEMA) is of the most effective means in electromagnetic analysis. However, the efficiency of traditional CEMA is limited by some insignificant' electromagnetic traces. It is necessary to select the helpful subset of the electromagnetic traces for analysis rather than using the whole electromagnetic traces set to improve the efficiency. In this paper, we first give an proposition about the CEMA and prove it by mathematical theory. This proposition illustrates the feasibility of selecting electromagnetic traces. Then we propose a method that is based on Singular Value Decomposition to select electromagnetic traces. This method is adaptive and doesn't need any external parameter. Besides, this method is useful for analyzing both unprotected implementation and masked implementation. We carry out the practical experiments by our SVD-CEMA and CEMA in the same scenario. The experimental results verify that the key-recovery efficiency of our method is higher than CEMA.\",\"PeriodicalId\":326016,\"journal\":{\"name\":\"2016 IEEE International Symposium on Electromagnetic Compatibility (EMC)\",\"volume\":\"78 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-09-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE International Symposium on Electromagnetic Compatibility (EMC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISEMC.2016.7571638\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Symposium on Electromagnetic Compatibility (EMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISEMC.2016.7571638","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An adaptive singular value decomposition-based method to enhance correlation electromagnetic analysis
Electromagnetic analysis in side channel attack exploits the information of electromagnetic radiation that leaks from the cryptographic devices when they are running. It's no-table because of its efficiency and easiness to perform. Correlation electromagnetic analysis (CEMA) is of the most effective means in electromagnetic analysis. However, the efficiency of traditional CEMA is limited by some insignificant' electromagnetic traces. It is necessary to select the helpful subset of the electromagnetic traces for analysis rather than using the whole electromagnetic traces set to improve the efficiency. In this paper, we first give an proposition about the CEMA and prove it by mathematical theory. This proposition illustrates the feasibility of selecting electromagnetic traces. Then we propose a method that is based on Singular Value Decomposition to select electromagnetic traces. This method is adaptive and doesn't need any external parameter. Besides, this method is useful for analyzing both unprotected implementation and masked implementation. We carry out the practical experiments by our SVD-CEMA and CEMA in the same scenario. The experimental results verify that the key-recovery efficiency of our method is higher than CEMA.