Advertisement

An Unsupervised Learning Model to Perform Side Channel Attack

  • Jung-Wei Chou
  • Min-Huang Chu
  • Yi-Lin Tsai
  • Yun Jin
  • Chen-Mou Cheng
  • Shou-De Lin
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7818)

Abstract

This paper proposes a novel unsupervised learning approach for Power Analysis – a form of side channel attack in Cryptanalysis. Different from existing works that exploit supervised learning framework to solve this problem, our method does not require any labeled pairs, which contains information of the form {X,Y}={key, power-trace}, but is still capable of deciphering the secret key accurately. Besides proposing a regression-based, unsupervised approach for this purpose, we further propose an enhanced model through exploiting the dependency of key bits between different sub-processes during the encryption process to obtain accurate results in a more efficient way. Our experiment shows that the proposed method outperforms the state-of-the-art non-learning based decipherment methods significantly.

Keywords

Power analysis side channel attack unsupervised learning 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Kelsey, J., Schneier, B., Wagner, D., Hall, C.: Side channel cryptanalysis of product ciphers. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 97–110. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  2. 2.
    Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM side–channel(s). In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 29–45. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  3. 3.
    Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)Google Scholar
  4. 4.
    Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  5. 5.
    Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Transactions on Computer 51(5), 541–552 (2002)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Bévan, R., Knudsen, E.W.: Ways to Enhance Differential Power Analysis. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 327–342. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  7. 7.
    Le, T.-H., Clédière, J., Canovas, C., Robisson, B., Servière, C., Lacoume, J.-L.: A proposition for Correlation Power Analysis enhancement. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 174–186. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  8. 8.
    Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  9. 9.
    DPA contest (2008-2009), http://www.dpacontest.org/home/
  10. 10.
    Komano, Y., Shimizu, H., Kawamura, S.: BS-CPA: Built-in Determined Sub-key Correlation Power Analysis. In: Proceedings of IEICE Transactions (2010)Google Scholar
  11. 11.
    Lerman, L., Bontempi, G., Markowitch, O.: Side-channel attack - an approach based on machine learning. In: Second International Workshop on Constructive Side Channel Analysis and Secure Design, COSAED 2011 (2011)Google Scholar
  12. 12.
    Almeida, A.: A Simple Improvement of Classical Correlation Power Analysis Attack on DES, DPA contest (2008/2009)Google Scholar
  13. 13.
    Chari, S., Rao, J.R., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13–28. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  14. 14.
    Backes, M., Durmuth, M., Gerling, S., Pinkal, M., Sporleder, C.: Acoustic side-channel attacks on printers. In: USENIX, p. 20. USENIX Association, USA (2010)Google Scholar
  15. 15.
    Hospodar, G., Mulder, E.D., Gierlichs, B., Verbauwhede, I., Vandewalle, J.: Least Squares Support Vector Machines for Side-Channel Analysis. In: Second International Workshop on Constructive SideChannel Analysis and Secure Design (2011)Google Scholar
  16. 16.
    Prouff, E., Rivain, M., Bevan, R.: Statistical Analysis of Second Order Differential Power Analysis. IEEE Transactions on Computers 58(6), 799–811 (2009)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Jung-Wei Chou
    • 1
  • Min-Huang Chu
    • 1
  • Yi-Lin Tsai
    • 1
  • Yun Jin
    • 2
  • Chen-Mou Cheng
    • 2
  • Shou-De Lin
    • 1
  1. 1.Department of Computer ScienceNational Taiwan UniversityTaiwan
  2. 2.Department of Electric EngineeringNational Taiwan UniversityTaiwan

Personalised recommendations