Feature selection methods for non-profiled side-channel attacks on ECC

Elliptic curve cryptography (ECC) is a public key cryptosystem which is widely used for different real world applications. With the introduction of side-channel attacks, there is a growing concern regarding the security of such implementations. Indeed, side-channel attacks have been reported to brea...

全面介紹

Saved in:
書目詳細資料
Main Authors: Bhasin, Shivam, Ravi, Prasanna, Jungk, Bernhard, Jap, Dirmanto, Najm, Zakaria
其他作者: 2018 IEEE 23rd International Conference on Digital Signal Processing (DSP)
格式: Conference or Workshop Item
語言:English
出版: 2019
主題:
在線閱讀:https://hdl.handle.net/10356/103427
http://hdl.handle.net/10220/49171
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
實物特徵
總結:Elliptic curve cryptography (ECC) is a public key cryptosystem which is widely used for different real world applications. With the introduction of side-channel attacks, there is a growing concern regarding the security of such implementations. Indeed, side-channel attacks have been reported to break even the theoretically secure ciphers due to the exploit in the physical leakage. The non-profiled side-channel attacks, especially are considered more serious than the profiled counterpart, as the former can work in almost black box setting. Several attacks have been proposed, however, one of the main issue normally encountered is regarding the selection of relevant features from the side-channel signal. For ECC implementation, normally the side-channel measurements will contain lots of irrelevant points which could hinder the effectiveness of the attack. For profiling scenario, these features can be determined, since the attacker has full knowledge, however, for black box non-profiled setting, this might pose an issue. In this work, we investigate different feature selection approaches to improve the accuracy for non-profiled attacks on ECC.