Marcin Aftowicz , Ievgen Kabin , Zoya Dyka , Peter Langendoerfer
{"title":"单痕量 SCA 攻击中无监督学习分析方法的优势","authors":"Marcin Aftowicz , Ievgen Kabin , Zoya Dyka , Peter Langendoerfer","doi":"10.1016/j.micpro.2023.104994","DOIUrl":null,"url":null,"abstract":"<div><p><span><span><span><span>Machine learning techniques<span> are commonly employed in the context of Side Channel Analysis attacks. The </span></span>clustering algorithms can be successfully used as classifiers in single execution attacks against implementations of </span>Elliptic Curve </span>point multiplication known as </span><em>kP</em> operation. They can distinguish between the processing of ‘ones’ and ‘zeros’ during secret scalar processing in the binary <em>kP</em><span> algorithm. The successful SCA performed by designers can aid in recognizing the leakage sources in cryptographic designs and lead to improvement of the cryptographic implementations. In this work we investigate the influence of the hamming weight of scalar </span><em>k</em><span> on the success rate of the single-trace attack. We used the clustering method </span><em>K-means</em> and the statistical method <em>the comparison to the mean</em><span>. We analysed simulated power traces and power traces of an FPGA implementation to conclude that </span><em>K-means</em>, unlike <em>the comparison to the mean</em>, was able to deal with extracting the scalar even when it is consisted of less than 30% of ‘ones’ and more than 70% of ‘ones’.</p></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"105 ","pages":"Article 104994"},"PeriodicalIF":1.9000,"publicationDate":"2023-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Advantages of unsupervised learning analysis methods in single-trace SCA attacks\",\"authors\":\"Marcin Aftowicz , Ievgen Kabin , Zoya Dyka , Peter Langendoerfer\",\"doi\":\"10.1016/j.micpro.2023.104994\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p><span><span><span><span>Machine learning techniques<span> are commonly employed in the context of Side Channel Analysis attacks. The </span></span>clustering algorithms can be successfully used as classifiers in single execution attacks against implementations of </span>Elliptic Curve </span>point multiplication known as </span><em>kP</em> operation. They can distinguish between the processing of ‘ones’ and ‘zeros’ during secret scalar processing in the binary <em>kP</em><span> algorithm. The successful SCA performed by designers can aid in recognizing the leakage sources in cryptographic designs and lead to improvement of the cryptographic implementations. In this work we investigate the influence of the hamming weight of scalar </span><em>k</em><span> on the success rate of the single-trace attack. We used the clustering method </span><em>K-means</em> and the statistical method <em>the comparison to the mean</em><span>. We analysed simulated power traces and power traces of an FPGA implementation to conclude that </span><em>K-means</em>, unlike <em>the comparison to the mean</em>, was able to deal with extracting the scalar even when it is consisted of less than 30% of ‘ones’ and more than 70% of ‘ones’.</p></div>\",\"PeriodicalId\":49815,\"journal\":{\"name\":\"Microprocessors and Microsystems\",\"volume\":\"105 \",\"pages\":\"Article 104994\"},\"PeriodicalIF\":1.9000,\"publicationDate\":\"2023-12-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Microprocessors and Microsystems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0141933123002399\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Microprocessors and Microsystems","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0141933123002399","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
Advantages of unsupervised learning analysis methods in single-trace SCA attacks
Machine learning techniques are commonly employed in the context of Side Channel Analysis attacks. The clustering algorithms can be successfully used as classifiers in single execution attacks against implementations of Elliptic Curve point multiplication known as kP operation. They can distinguish between the processing of ‘ones’ and ‘zeros’ during secret scalar processing in the binary kP algorithm. The successful SCA performed by designers can aid in recognizing the leakage sources in cryptographic designs and lead to improvement of the cryptographic implementations. In this work we investigate the influence of the hamming weight of scalar k on the success rate of the single-trace attack. We used the clustering method K-means and the statistical method the comparison to the mean. We analysed simulated power traces and power traces of an FPGA implementation to conclude that K-means, unlike the comparison to the mean, was able to deal with extracting the scalar even when it is consisted of less than 30% of ‘ones’ and more than 70% of ‘ones’.
期刊介绍:
Microprocessors and Microsystems: Embedded Hardware Design (MICPRO) is a journal covering all design and architectural aspects related to embedded systems hardware. This includes different embedded system hardware platforms ranging from custom hardware via reconfigurable systems and application specific processors to general purpose embedded processors. Special emphasis is put on novel complex embedded architectures, such as systems on chip (SoC), systems on a programmable/reconfigurable chip (SoPC) and multi-processor systems on a chip (MPSoC), as well as, their memory and communication methods and structures, such as network-on-chip (NoC).
Design automation of such systems including methodologies, techniques, flows and tools for their design, as well as, novel designs of hardware components fall within the scope of this journal. Novel cyber-physical applications that use embedded systems are also central in this journal. While software is not in the main focus of this journal, methods of hardware/software co-design, as well as, application restructuring and mapping to embedded hardware platforms, that consider interplay between software and hardware components with emphasis on hardware, are also in the journal scope.