{"title":"二维SOST:用于密码系统侧信道分析的多维泄漏提取","authors":"Zheng Liu, Congming Wei, Shengjun Wen, Shaofei Sun, Yaoling Ding, Anzhou Wang","doi":"10.1109/CSP58884.2023.00008","DOIUrl":null,"url":null,"abstract":"In 2021, Perin et al. proposed a horizontal attack framework against elliptic curve scalar multiplication (ECSM) operation based on the work of Nascimento et al. Their framework consists roughly of three steps. First, they apply k-means on the iteration traces from multiple ECSM executions, then, the results of clustering are used to make a leakage metric trace by using sum-of-squared t-values (SOST), based on the leakage metric trace, the points of interest (POI) are selected. Second, they apply k-means on those POIs to get initial labels for the scalar bits, the accuracy of initial labels is only 52%. Third, wrong bits are corrected by using an iterative deep learning framework. Our work focus on improving the horizontal attack framework by replacing SOST with our proposed two dimensional SOST (2D-SOST) to improve the efficiency of POI selection under unsupervised context. 2D-SOST can extract leakage information between dimensions while SOST can only extract information on one dimension which limits its performance. By replacing SOST with 2D-SOST, our method improves the accuracy of clustering algorithm from an average of 58% to an average of 74%. We also simplified the framework used in original paper and finally recover scalar bits successfully under the configuration where the original paper can not.","PeriodicalId":255083,"journal":{"name":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Two Dimensional SOST: Extract Multi-Dimensional Leakage for Side-Channel Analysis on Cryptosystems\",\"authors\":\"Zheng Liu, Congming Wei, Shengjun Wen, Shaofei Sun, Yaoling Ding, Anzhou Wang\",\"doi\":\"10.1109/CSP58884.2023.00008\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In 2021, Perin et al. proposed a horizontal attack framework against elliptic curve scalar multiplication (ECSM) operation based on the work of Nascimento et al. Their framework consists roughly of three steps. First, they apply k-means on the iteration traces from multiple ECSM executions, then, the results of clustering are used to make a leakage metric trace by using sum-of-squared t-values (SOST), based on the leakage metric trace, the points of interest (POI) are selected. Second, they apply k-means on those POIs to get initial labels for the scalar bits, the accuracy of initial labels is only 52%. Third, wrong bits are corrected by using an iterative deep learning framework. Our work focus on improving the horizontal attack framework by replacing SOST with our proposed two dimensional SOST (2D-SOST) to improve the efficiency of POI selection under unsupervised context. 2D-SOST can extract leakage information between dimensions while SOST can only extract information on one dimension which limits its performance. By replacing SOST with 2D-SOST, our method improves the accuracy of clustering algorithm from an average of 58% to an average of 74%. We also simplified the framework used in original paper and finally recover scalar bits successfully under the configuration where the original paper can not.\",\"PeriodicalId\":255083,\"journal\":{\"name\":\"2023 7th International Conference on Cryptography, Security and Privacy (CSP)\",\"volume\":\"99 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 7th International Conference on Cryptography, Security and Privacy (CSP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSP58884.2023.00008\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSP58884.2023.00008","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Two Dimensional SOST: Extract Multi-Dimensional Leakage for Side-Channel Analysis on Cryptosystems
In 2021, Perin et al. proposed a horizontal attack framework against elliptic curve scalar multiplication (ECSM) operation based on the work of Nascimento et al. Their framework consists roughly of three steps. First, they apply k-means on the iteration traces from multiple ECSM executions, then, the results of clustering are used to make a leakage metric trace by using sum-of-squared t-values (SOST), based on the leakage metric trace, the points of interest (POI) are selected. Second, they apply k-means on those POIs to get initial labels for the scalar bits, the accuracy of initial labels is only 52%. Third, wrong bits are corrected by using an iterative deep learning framework. Our work focus on improving the horizontal attack framework by replacing SOST with our proposed two dimensional SOST (2D-SOST) to improve the efficiency of POI selection under unsupervised context. 2D-SOST can extract leakage information between dimensions while SOST can only extract information on one dimension which limits its performance. By replacing SOST with 2D-SOST, our method improves the accuracy of clustering algorithm from an average of 58% to an average of 74%. We also simplified the framework used in original paper and finally recover scalar bits successfully under the configuration where the original paper can not.