Feature selection methods for non-profiled side-channel attacks on ECC
Elliptic curve cryptography (ECC) is a public key cryptosystem which is widely used for different real world applications. With the introduction of side-channel attacks, there is a growing concern regarding the security of such implementations. Indeed, side-channel attacks have been reported to brea...
Saved in:
Main Authors: | , , , , |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/103427 http://hdl.handle.net/10220/49171 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-103427 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1034272020-09-26T22:15:15Z Feature selection methods for non-profiled side-channel attacks on ECC Bhasin, Shivam Ravi, Prasanna Jungk, Bernhard Jap, Dirmanto Najm, Zakaria 2018 IEEE 23rd International Conference on Digital Signal Processing (DSP) Temasek Laboratories Cryptography Side-Channel Attacks Engineering::Electrical and electronic engineering Elliptic curve cryptography (ECC) is a public key cryptosystem which is widely used for different real world applications. With the introduction of side-channel attacks, there is a growing concern regarding the security of such implementations. Indeed, side-channel attacks have been reported to break even the theoretically secure ciphers due to the exploit in the physical leakage. The non-profiled side-channel attacks, especially are considered more serious than the profiled counterpart, as the former can work in almost black box setting. Several attacks have been proposed, however, one of the main issue normally encountered is regarding the selection of relevant features from the side-channel signal. For ECC implementation, normally the side-channel measurements will contain lots of irrelevant points which could hinder the effectiveness of the attack. For profiling scenario, these features can be determined, since the attacker has full knowledge, however, for black box non-profiled setting, this might pose an issue. In this work, we investigate different feature selection approaches to improve the accuracy for non-profiled attacks on ECC. Accepted version 2019-07-08T02:57:43Z 2019-12-06T21:12:29Z 2019-07-08T02:57:43Z 2019-12-06T21:12:29Z 2018-11-01 2018 Conference Paper Ravi, P., Jungk, B., Jap, D., Najm, Z., & Bhasin, S. (2018). Feature selection methods for non-profiled side-channel attacks on ECC. 2018 IEEE 23rd International Conference on Digital Signal Processing (DSP). doi:10.1109/ICDSP.2018.8631824 https://hdl.handle.net/10356/103427 http://hdl.handle.net/10220/49171 10.1109/ICDSP.2018.8631824 212650 en © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/ICDSP.2018.8631824 5 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
country |
Singapore |
collection |
DR-NTU |
language |
English |
topic |
Cryptography Side-Channel Attacks Engineering::Electrical and electronic engineering |
spellingShingle |
Cryptography Side-Channel Attacks Engineering::Electrical and electronic engineering Bhasin, Shivam Ravi, Prasanna Jungk, Bernhard Jap, Dirmanto Najm, Zakaria Feature selection methods for non-profiled side-channel attacks on ECC |
description |
Elliptic curve cryptography (ECC) is a public key cryptosystem which is widely used for different real world applications. With the introduction of side-channel attacks, there is a growing concern regarding the security of such implementations. Indeed, side-channel attacks have been reported to break even the theoretically secure ciphers due to the exploit in the physical leakage. The non-profiled side-channel attacks, especially are considered more serious than the profiled counterpart, as the former can work in almost black box setting. Several attacks have been proposed, however, one of the main issue normally encountered is regarding the selection of relevant features from the side-channel signal. For ECC implementation, normally the side-channel measurements will contain lots of irrelevant points which could hinder the effectiveness of the attack. For profiling scenario, these features can be determined, since the attacker has full knowledge, however, for black box non-profiled setting, this might pose an issue. In this work, we investigate different feature selection approaches to improve the accuracy for non-profiled attacks on ECC. |
author2 |
2018 IEEE 23rd International Conference on Digital Signal Processing (DSP) |
author_facet |
2018 IEEE 23rd International Conference on Digital Signal Processing (DSP) Bhasin, Shivam Ravi, Prasanna Jungk, Bernhard Jap, Dirmanto Najm, Zakaria |
format |
Conference or Workshop Item |
author |
Bhasin, Shivam Ravi, Prasanna Jungk, Bernhard Jap, Dirmanto Najm, Zakaria |
author_sort |
Bhasin, Shivam |
title |
Feature selection methods for non-profiled side-channel attacks on ECC |
title_short |
Feature selection methods for non-profiled side-channel attacks on ECC |
title_full |
Feature selection methods for non-profiled side-channel attacks on ECC |
title_fullStr |
Feature selection methods for non-profiled side-channel attacks on ECC |
title_full_unstemmed |
Feature selection methods for non-profiled side-channel attacks on ECC |
title_sort |
feature selection methods for non-profiled side-channel attacks on ecc |
publishDate |
2019 |
url |
https://hdl.handle.net/10356/103427 http://hdl.handle.net/10220/49171 |
_version_ |
1681056817505894400 |