A highly efficient side channel attack with profiling through relevance-learning on physical leakage information

We propose a Profiling through Relevance-Learning (PRL) technique on Physical Leakage Information (PLI) to extract highly correlated PLI with processed data, as to achieve a highly efficient yet robust Side Channel Attack (SCA). There are four key features in our proposed PRL. First, variance analys...

Full description

Saved in:
Bibliographic Details
Main Authors: Ali Akbar Pammu, Chong, Kwen-Siong, Wang, Yi, Gwee, Bah-Hwee
Other Authors: School of Electrical and Electronic Engineering
Format: Article
Language:English
Published: 2021
Subjects:
Online Access:https://hdl.handle.net/10356/150980
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-150980
record_format dspace
spelling sg-ntu-dr.10356-1509802021-06-02T02:43:29Z A highly efficient side channel attack with profiling through relevance-learning on physical leakage information Ali Akbar Pammu Chong, Kwen-Siong Wang, Yi Gwee, Bah-Hwee School of Electrical and Electronic Engineering Engineering::Electrical and electronic engineering Profiling SCA Profiling Through Relevance-learning We propose a Profiling through Relevance-Learning (PRL) technique on Physical Leakage Information (PLI) to extract highly correlated PLI with processed data, as to achieve a highly efficient yet robust Side Channel Attack (SCA). There are four key features in our proposed PRL. First, variance analysis on PLI is implemented to determine the boundary of the clusters and objects of the clusters. Second, the nearest-neighbor k-NN variance clustering is used to reduce the sampling points of PLI by clustering the high variance sampling points and discarding the low variance sampling points of PLI measurements (traces). These clustered sampling points, which are highly correlated with the processed data, contain pertinent leakage information related to the secret key. Third, the information associated with the secret key is spread in several neighboring sampling points with different degrees of leakages. We analytically derive the Key-leakage relevance factor for each clustered sampling point to quantify the degree of leakage associated with the secret key. Fourth, by means of Hebbian learning, a weight proportional to the Key-leakage relevance factor is updated iteratively based on the values of relevance factor and traces of the sampling points. The converged weights which are being assigned to clustered sampling points are linked to their associated PLI to further increase the correlation of the PLI with the processed data. Therefore, the required number of PLI measurements, to reveal the secret key, can be reduced significantly. In addition, we analytically show that the computational complexity of our proposed PRL is O(n) when compared to the reported profiling techniques having O(n ) and O(n ) computational complexities. Based on the experiments of our proposed PRL performed on the PLI of AES-128 algorithm, the results depicting that the sampling points of PLI are reduced 87 percent after the k-NN variance clustering. The converged weight with learning error rate >10 traces, our proposed PRL is ∼2,000× more efficient in performing SCA. Agency for Science, Technology and Research (A*STAR) This research work was supported by Agency for Science, Technology and Research (A STAR), Singapore, under SERC 2013 Public Sector Research Funding, Grant No: SERC1321202098. The authors thank A STAR for the kind funding support. 2021-06-02T02:43:29Z 2021-06-02T02:43:29Z 2018 Journal Article Ali Akbar Pammu, Chong, K., Wang, Y. & Gwee, B. (2018). A highly efficient side channel attack with profiling through relevance-learning on physical leakage information. IEEE Transactions On Dependable and Secure Computing, 16(3), 376-387. https://dx.doi.org/10.1109/TDSC.2018.2864727 1545-5971 0000-0001-9857-5096 0000-0003-1512-2003 https://hdl.handle.net/10356/150980 10.1109/TDSC.2018.2864727 2-s2.0-85052563416 3 16 376 387 en SERC1321202098 IEEE Transactions on Dependable and Secure Computing © 2018 IEEE. All rights reserved.
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Electrical and electronic engineering
Profiling SCA
Profiling Through Relevance-learning
spellingShingle Engineering::Electrical and electronic engineering
Profiling SCA
Profiling Through Relevance-learning
Ali Akbar Pammu
Chong, Kwen-Siong
Wang, Yi
Gwee, Bah-Hwee
A highly efficient side channel attack with profiling through relevance-learning on physical leakage information
description We propose a Profiling through Relevance-Learning (PRL) technique on Physical Leakage Information (PLI) to extract highly correlated PLI with processed data, as to achieve a highly efficient yet robust Side Channel Attack (SCA). There are four key features in our proposed PRL. First, variance analysis on PLI is implemented to determine the boundary of the clusters and objects of the clusters. Second, the nearest-neighbor k-NN variance clustering is used to reduce the sampling points of PLI by clustering the high variance sampling points and discarding the low variance sampling points of PLI measurements (traces). These clustered sampling points, which are highly correlated with the processed data, contain pertinent leakage information related to the secret key. Third, the information associated with the secret key is spread in several neighboring sampling points with different degrees of leakages. We analytically derive the Key-leakage relevance factor for each clustered sampling point to quantify the degree of leakage associated with the secret key. Fourth, by means of Hebbian learning, a weight proportional to the Key-leakage relevance factor is updated iteratively based on the values of relevance factor and traces of the sampling points. The converged weights which are being assigned to clustered sampling points are linked to their associated PLI to further increase the correlation of the PLI with the processed data. Therefore, the required number of PLI measurements, to reveal the secret key, can be reduced significantly. In addition, we analytically show that the computational complexity of our proposed PRL is O(n) when compared to the reported profiling techniques having O(n ) and O(n ) computational complexities. Based on the experiments of our proposed PRL performed on the PLI of AES-128 algorithm, the results depicting that the sampling points of PLI are reduced 87 percent after the k-NN variance clustering. The converged weight with learning error rate >10 traces, our proposed PRL is ∼2,000× more efficient in performing SCA.
author2 School of Electrical and Electronic Engineering
author_facet School of Electrical and Electronic Engineering
Ali Akbar Pammu
Chong, Kwen-Siong
Wang, Yi
Gwee, Bah-Hwee
format Article
author Ali Akbar Pammu
Chong, Kwen-Siong
Wang, Yi
Gwee, Bah-Hwee
author_sort Ali Akbar Pammu
title A highly efficient side channel attack with profiling through relevance-learning on physical leakage information
title_short A highly efficient side channel attack with profiling through relevance-learning on physical leakage information
title_full A highly efficient side channel attack with profiling through relevance-learning on physical leakage information
title_fullStr A highly efficient side channel attack with profiling through relevance-learning on physical leakage information
title_full_unstemmed A highly efficient side channel attack with profiling through relevance-learning on physical leakage information
title_sort highly efficient side channel attack with profiling through relevance-learning on physical leakage information
publishDate 2021
url https://hdl.handle.net/10356/150980
_version_ 1702431304700657664