Feature selection methods for non-profiled side-channel attacks on ECC

Elliptic curve cryptography (ECC) is a public key cryptosystem which is widely used for different real world applications. With the introduction of side-channel attacks, there is a growing concern regarding the security of such implementations. Indeed, side-channel attacks have been reported to brea...

Full description

Saved in:
Bibliographic Details
Main Authors: Bhasin, Shivam, Ravi, Prasanna, Jungk, Bernhard, Jap, Dirmanto, Najm, Zakaria
Other Authors: 2018 IEEE 23rd International Conference on Digital Signal Processing (DSP)
Format: Conference or Workshop Item
Language:English
Published: 2019
Subjects:
Online Access:https://hdl.handle.net/10356/103427
http://hdl.handle.net/10220/49171
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-103427
record_format dspace
spelling sg-ntu-dr.10356-1034272020-09-26T22:15:15Z Feature selection methods for non-profiled side-channel attacks on ECC Bhasin, Shivam Ravi, Prasanna Jungk, Bernhard Jap, Dirmanto Najm, Zakaria 2018 IEEE 23rd International Conference on Digital Signal Processing (DSP) Temasek Laboratories Cryptography Side-Channel Attacks Engineering::Electrical and electronic engineering Elliptic curve cryptography (ECC) is a public key cryptosystem which is widely used for different real world applications. With the introduction of side-channel attacks, there is a growing concern regarding the security of such implementations. Indeed, side-channel attacks have been reported to break even the theoretically secure ciphers due to the exploit in the physical leakage. The non-profiled side-channel attacks, especially are considered more serious than the profiled counterpart, as the former can work in almost black box setting. Several attacks have been proposed, however, one of the main issue normally encountered is regarding the selection of relevant features from the side-channel signal. For ECC implementation, normally the side-channel measurements will contain lots of irrelevant points which could hinder the effectiveness of the attack. For profiling scenario, these features can be determined, since the attacker has full knowledge, however, for black box non-profiled setting, this might pose an issue. In this work, we investigate different feature selection approaches to improve the accuracy for non-profiled attacks on ECC. Accepted version 2019-07-08T02:57:43Z 2019-12-06T21:12:29Z 2019-07-08T02:57:43Z 2019-12-06T21:12:29Z 2018-11-01 2018 Conference Paper Ravi, P., Jungk, B., Jap, D., Najm, Z., & Bhasin, S. (2018). Feature selection methods for non-profiled side-channel attacks on ECC. 2018 IEEE 23rd International Conference on Digital Signal Processing (DSP). doi:10.1109/ICDSP.2018.8631824 https://hdl.handle.net/10356/103427 http://hdl.handle.net/10220/49171 10.1109/ICDSP.2018.8631824 212650 en © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/ICDSP.2018.8631824 5 p. application/pdf
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
topic Cryptography
Side-Channel Attacks
Engineering::Electrical and electronic engineering
spellingShingle Cryptography
Side-Channel Attacks
Engineering::Electrical and electronic engineering
Bhasin, Shivam
Ravi, Prasanna
Jungk, Bernhard
Jap, Dirmanto
Najm, Zakaria
Feature selection methods for non-profiled side-channel attacks on ECC
description Elliptic curve cryptography (ECC) is a public key cryptosystem which is widely used for different real world applications. With the introduction of side-channel attacks, there is a growing concern regarding the security of such implementations. Indeed, side-channel attacks have been reported to break even the theoretically secure ciphers due to the exploit in the physical leakage. The non-profiled side-channel attacks, especially are considered more serious than the profiled counterpart, as the former can work in almost black box setting. Several attacks have been proposed, however, one of the main issue normally encountered is regarding the selection of relevant features from the side-channel signal. For ECC implementation, normally the side-channel measurements will contain lots of irrelevant points which could hinder the effectiveness of the attack. For profiling scenario, these features can be determined, since the attacker has full knowledge, however, for black box non-profiled setting, this might pose an issue. In this work, we investigate different feature selection approaches to improve the accuracy for non-profiled attacks on ECC.
author2 2018 IEEE 23rd International Conference on Digital Signal Processing (DSP)
author_facet 2018 IEEE 23rd International Conference on Digital Signal Processing (DSP)
Bhasin, Shivam
Ravi, Prasanna
Jungk, Bernhard
Jap, Dirmanto
Najm, Zakaria
format Conference or Workshop Item
author Bhasin, Shivam
Ravi, Prasanna
Jungk, Bernhard
Jap, Dirmanto
Najm, Zakaria
author_sort Bhasin, Shivam
title Feature selection methods for non-profiled side-channel attacks on ECC
title_short Feature selection methods for non-profiled side-channel attacks on ECC
title_full Feature selection methods for non-profiled side-channel attacks on ECC
title_fullStr Feature selection methods for non-profiled side-channel attacks on ECC
title_full_unstemmed Feature selection methods for non-profiled side-channel attacks on ECC
title_sort feature selection methods for non-profiled side-channel attacks on ecc
publishDate 2019
url https://hdl.handle.net/10356/103427
http://hdl.handle.net/10220/49171
_version_ 1681056817505894400