A first study of compressive sensing for side-channel leakage sampling

An important prerequisite for Side-Channel Attacks (SCA) is leakage sampling where the side-channel measurements (i.e. power traces) of the cryptographic device are collected for further analysis. However, as the operating frequency of cryptographic devices continues to increase due to advancing tec...

Full description

Saved in:
Bibliographic Details
Main Authors: Ou, Changhai, Zhou, Chengju, Lam, Siew-Kei
Other Authors: School of Computer Science and Engineering
Format: Article
Language:English
Published: 2020
Subjects:
Online Access:https://hdl.handle.net/10356/143854
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-143854
record_format dspace
spelling sg-ntu-dr.10356-1438542020-09-28T02:34:42Z A first study of compressive sensing for side-channel leakage sampling Ou, Changhai Zhou, Chengju Lam, Siew-Kei School of Computer Science and Engineering Engineering::Computer science and engineering Embedded Systems Cryptography An important prerequisite for Side-Channel Attacks (SCA) is leakage sampling where the side-channel measurements (i.e. power traces) of the cryptographic device are collected for further analysis. However, as the operating frequency of cryptographic devices continues to increase due to advancing technology, leakage sampling will impose higher requirements on the sampling rate and storage capacity of the sampling equipment. This paper undertakes the first study to show that effective leakage sampling can be achieved without relying on sophisticated equipments through Compressive Sensing (CS). As long as the information is leaked in the low frequency component, CS can obtain low-dimensional samples by simply projecting the high-dimensional signals onto the observation matrix. The power traces can then be reconstructed in a workstation for further analysis and storage. With this approach, the sampling rate to obtain power traces is no longer limited by the operating frequency of the cryptographic device and Nyquist sampling theorem. Instead it depends on the sparsity of the leakage signal. As such, CS can employ a much lower sampling rate and yet obtain equivalent leakage sampling performance, which significantly lowers the requirement of sampling equipments. The feasibility of our approach is verified theoretically and through experiments. National Research Foundation (NRF) Accepted version 2020-09-28T02:34:42Z 2020-09-28T02:34:42Z 2020 Journal Article Ou, C., Zhou, C., & Lam, S.-K. (2020). A first study of compressive sensing for side-channel leakage sampling. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39(10), 2166-2177. doi:10.1109/TCAD.2019.2960337 0278-0070 https://hdl.handle.net/10356/143854 10.1109/TCAD.2019.2960337 10 39 2166 2177 en IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems © 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/TCAD.2019.2960337 application/pdf
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
topic Engineering::Computer science and engineering
Embedded Systems
Cryptography
spellingShingle Engineering::Computer science and engineering
Embedded Systems
Cryptography
Ou, Changhai
Zhou, Chengju
Lam, Siew-Kei
A first study of compressive sensing for side-channel leakage sampling
description An important prerequisite for Side-Channel Attacks (SCA) is leakage sampling where the side-channel measurements (i.e. power traces) of the cryptographic device are collected for further analysis. However, as the operating frequency of cryptographic devices continues to increase due to advancing technology, leakage sampling will impose higher requirements on the sampling rate and storage capacity of the sampling equipment. This paper undertakes the first study to show that effective leakage sampling can be achieved without relying on sophisticated equipments through Compressive Sensing (CS). As long as the information is leaked in the low frequency component, CS can obtain low-dimensional samples by simply projecting the high-dimensional signals onto the observation matrix. The power traces can then be reconstructed in a workstation for further analysis and storage. With this approach, the sampling rate to obtain power traces is no longer limited by the operating frequency of the cryptographic device and Nyquist sampling theorem. Instead it depends on the sparsity of the leakage signal. As such, CS can employ a much lower sampling rate and yet obtain equivalent leakage sampling performance, which significantly lowers the requirement of sampling equipments. The feasibility of our approach is verified theoretically and through experiments.
author2 School of Computer Science and Engineering
author_facet School of Computer Science and Engineering
Ou, Changhai
Zhou, Chengju
Lam, Siew-Kei
format Article
author Ou, Changhai
Zhou, Chengju
Lam, Siew-Kei
author_sort Ou, Changhai
title A first study of compressive sensing for side-channel leakage sampling
title_short A first study of compressive sensing for side-channel leakage sampling
title_full A first study of compressive sensing for side-channel leakage sampling
title_fullStr A first study of compressive sensing for side-channel leakage sampling
title_full_unstemmed A first study of compressive sensing for side-channel leakage sampling
title_sort first study of compressive sensing for side-channel leakage sampling
publishDate 2020
url https://hdl.handle.net/10356/143854
_version_ 1681059318810542080