单痕量 SCA 攻击中无监督学习分析方法的优势

IF 1.9 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE
Marcin Aftowicz , Ievgen Kabin , Zoya Dyka , Peter Langendoerfer
{"title":"单痕量 SCA 攻击中无监督学习分析方法的优势","authors":"Marcin Aftowicz ,&nbsp;Ievgen Kabin ,&nbsp;Zoya Dyka ,&nbsp;Peter Langendoerfer","doi":"10.1016/j.micpro.2023.104994","DOIUrl":null,"url":null,"abstract":"<div><p><span><span><span><span>Machine learning techniques<span> are commonly employed in the context of Side Channel Analysis attacks. The </span></span>clustering algorithms can be successfully used as classifiers in single execution attacks against implementations of </span>Elliptic Curve </span>point multiplication known as </span><em>kP</em> operation. They can distinguish between the processing of ‘ones’ and ‘zeros’ during secret scalar processing in the binary <em>kP</em><span> algorithm. The successful SCA performed by designers can aid in recognizing the leakage sources in cryptographic designs and lead to improvement of the cryptographic implementations. In this work we investigate the influence of the hamming weight of scalar </span><em>k</em><span> on the success rate of the single-trace attack. We used the clustering method </span><em>K-means</em> and the statistical method <em>the comparison to the mean</em><span>. We analysed simulated power traces and power traces of an FPGA implementation to conclude that </span><em>K-means</em>, unlike <em>the comparison to the mean</em>, was able to deal with extracting the scalar even when it is consisted of less than 30% of ‘ones’ and more than 70% of ‘ones’.</p></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"105 ","pages":"Article 104994"},"PeriodicalIF":1.9000,"publicationDate":"2023-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Advantages of unsupervised learning analysis methods in single-trace SCA attacks\",\"authors\":\"Marcin Aftowicz ,&nbsp;Ievgen Kabin ,&nbsp;Zoya Dyka ,&nbsp;Peter Langendoerfer\",\"doi\":\"10.1016/j.micpro.2023.104994\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p><span><span><span><span>Machine learning techniques<span> are commonly employed in the context of Side Channel Analysis attacks. The </span></span>clustering algorithms can be successfully used as classifiers in single execution attacks against implementations of </span>Elliptic Curve </span>point multiplication known as </span><em>kP</em> operation. They can distinguish between the processing of ‘ones’ and ‘zeros’ during secret scalar processing in the binary <em>kP</em><span> algorithm. The successful SCA performed by designers can aid in recognizing the leakage sources in cryptographic designs and lead to improvement of the cryptographic implementations. In this work we investigate the influence of the hamming weight of scalar </span><em>k</em><span> on the success rate of the single-trace attack. We used the clustering method </span><em>K-means</em> and the statistical method <em>the comparison to the mean</em><span>. We analysed simulated power traces and power traces of an FPGA implementation to conclude that </span><em>K-means</em>, unlike <em>the comparison to the mean</em>, was able to deal with extracting the scalar even when it is consisted of less than 30% of ‘ones’ and more than 70% of ‘ones’.</p></div>\",\"PeriodicalId\":49815,\"journal\":{\"name\":\"Microprocessors and Microsystems\",\"volume\":\"105 \",\"pages\":\"Article 104994\"},\"PeriodicalIF\":1.9000,\"publicationDate\":\"2023-12-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Microprocessors and Microsystems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0141933123002399\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Microprocessors and Microsystems","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0141933123002399","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

摘要

机器学习技术通常用于侧信道分析攻击。在针对椭圆曲线点乘法(kP 运算)实现的单次执行攻击中,聚类算法可成功用作分类器。它们可以在二进制 kP 算法的秘密标量处理过程中区分 "1 "和 "0 "的处理。设计人员成功执行 SCA 可以帮助识别密码设计中的泄漏源,从而改进密码实现。在这项工作中,我们研究了标量 k 的汉明权重对单踪攻击成功率的影响。我们使用了 K-means 聚类方法和平均值比较统计方法。我们分析了模拟功率轨迹和 FPGA 实现的功率轨迹,得出结论:与平均值比较法不同,K-均值法能够提取标量,即使标量由少于 30% 的 "1 "和多于 70% 的 "1 "组成。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Advantages of unsupervised learning analysis methods in single-trace SCA attacks

Machine learning techniques are commonly employed in the context of Side Channel Analysis attacks. The clustering algorithms can be successfully used as classifiers in single execution attacks against implementations of Elliptic Curve point multiplication known as kP operation. They can distinguish between the processing of ‘ones’ and ‘zeros’ during secret scalar processing in the binary kP algorithm. The successful SCA performed by designers can aid in recognizing the leakage sources in cryptographic designs and lead to improvement of the cryptographic implementations. In this work we investigate the influence of the hamming weight of scalar k on the success rate of the single-trace attack. We used the clustering method K-means and the statistical method the comparison to the mean. We analysed simulated power traces and power traces of an FPGA implementation to conclude that K-means, unlike the comparison to the mean, was able to deal with extracting the scalar even when it is consisted of less than 30% of ‘ones’ and more than 70% of ‘ones’.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Microprocessors and Microsystems
Microprocessors and Microsystems 工程技术-工程:电子与电气
CiteScore
6.90
自引率
3.80%
发文量
204
审稿时长
172 days
期刊介绍: Microprocessors and Microsystems: Embedded Hardware Design (MICPRO) is a journal covering all design and architectural aspects related to embedded systems hardware. This includes different embedded system hardware platforms ranging from custom hardware via reconfigurable systems and application specific processors to general purpose embedded processors. Special emphasis is put on novel complex embedded architectures, such as systems on chip (SoC), systems on a programmable/reconfigurable chip (SoPC) and multi-processor systems on a chip (MPSoC), as well as, their memory and communication methods and structures, such as network-on-chip (NoC). Design automation of such systems including methodologies, techniques, flows and tools for their design, as well as, novel designs of hardware components fall within the scope of this journal. Novel cyber-physical applications that use embedded systems are also central in this journal. While software is not in the main focus of this journal, methods of hardware/software co-design, as well as, application restructuring and mapping to embedded hardware platforms, that consider interplay between software and hardware components with emphasis on hardware, are also in the journal scope.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信