A highly efficient side channel attack with profiling through relevance-learning on physical leakage information
We propose a Profiling through Relevance-Learning (PRL) technique on Physical Leakage Information (PLI) to extract highly correlated PLI with processed data, as to achieve a highly efficient yet robust Side Channel Attack (SCA). There are four key features in our proposed PRL. First, variance analys...
Saved in:
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/150980 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-150980 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1509802021-06-02T02:43:29Z A highly efficient side channel attack with profiling through relevance-learning on physical leakage information Ali Akbar Pammu Chong, Kwen-Siong Wang, Yi Gwee, Bah-Hwee School of Electrical and Electronic Engineering Engineering::Electrical and electronic engineering Profiling SCA Profiling Through Relevance-learning We propose a Profiling through Relevance-Learning (PRL) technique on Physical Leakage Information (PLI) to extract highly correlated PLI with processed data, as to achieve a highly efficient yet robust Side Channel Attack (SCA). There are four key features in our proposed PRL. First, variance analysis on PLI is implemented to determine the boundary of the clusters and objects of the clusters. Second, the nearest-neighbor k-NN variance clustering is used to reduce the sampling points of PLI by clustering the high variance sampling points and discarding the low variance sampling points of PLI measurements (traces). These clustered sampling points, which are highly correlated with the processed data, contain pertinent leakage information related to the secret key. Third, the information associated with the secret key is spread in several neighboring sampling points with different degrees of leakages. We analytically derive the Key-leakage relevance factor for each clustered sampling point to quantify the degree of leakage associated with the secret key. Fourth, by means of Hebbian learning, a weight proportional to the Key-leakage relevance factor is updated iteratively based on the values of relevance factor and traces of the sampling points. The converged weights which are being assigned to clustered sampling points are linked to their associated PLI to further increase the correlation of the PLI with the processed data. Therefore, the required number of PLI measurements, to reveal the secret key, can be reduced significantly. In addition, we analytically show that the computational complexity of our proposed PRL is O(n) when compared to the reported profiling techniques having O(n ) and O(n ) computational complexities. Based on the experiments of our proposed PRL performed on the PLI of AES-128 algorithm, the results depicting that the sampling points of PLI are reduced 87 percent after the k-NN variance clustering. The converged weight with learning error rate >10 traces, our proposed PRL is ∼2,000× more efficient in performing SCA. Agency for Science, Technology and Research (A*STAR) This research work was supported by Agency for Science, Technology and Research (A STAR), Singapore, under SERC 2013 Public Sector Research Funding, Grant No: SERC1321202098. The authors thank A STAR for the kind funding support. 2021-06-02T02:43:29Z 2021-06-02T02:43:29Z 2018 Journal Article Ali Akbar Pammu, Chong, K., Wang, Y. & Gwee, B. (2018). A highly efficient side channel attack with profiling through relevance-learning on physical leakage information. IEEE Transactions On Dependable and Secure Computing, 16(3), 376-387. https://dx.doi.org/10.1109/TDSC.2018.2864727 1545-5971 0000-0001-9857-5096 0000-0003-1512-2003 https://hdl.handle.net/10356/150980 10.1109/TDSC.2018.2864727 2-s2.0-85052563416 3 16 376 387 en SERC1321202098 IEEE Transactions on Dependable and Secure Computing © 2018 IEEE. All rights reserved. |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Electrical and electronic engineering Profiling SCA Profiling Through Relevance-learning |
spellingShingle |
Engineering::Electrical and electronic engineering Profiling SCA Profiling Through Relevance-learning Ali Akbar Pammu Chong, Kwen-Siong Wang, Yi Gwee, Bah-Hwee A highly efficient side channel attack with profiling through relevance-learning on physical leakage information |
description |
We propose a Profiling through Relevance-Learning (PRL) technique on Physical Leakage Information (PLI) to extract highly correlated PLI with processed data, as to achieve a highly efficient yet robust Side Channel Attack (SCA). There are four key features in our proposed PRL. First, variance analysis on PLI is implemented to determine the boundary of the clusters and objects of the clusters. Second, the nearest-neighbor k-NN variance clustering is used to reduce the sampling points of PLI by clustering the high variance sampling points and discarding the low variance sampling points of PLI measurements (traces). These clustered sampling points, which are highly correlated with the processed data, contain pertinent leakage information related to the secret key. Third, the information associated with the secret key is spread in several neighboring sampling points with different degrees of leakages. We analytically derive the Key-leakage relevance factor for each clustered sampling point to quantify the degree of leakage associated with the secret key. Fourth, by means of Hebbian learning, a weight proportional to the Key-leakage relevance factor is updated iteratively based on the values of relevance factor and traces of the sampling points. The converged weights which are being assigned to clustered sampling points are linked to their associated PLI to further increase the correlation of the PLI with the processed data. Therefore, the required number of PLI measurements, to reveal the secret key, can be reduced significantly. In addition, we analytically show that the computational complexity of our proposed PRL is O(n) when compared to the reported profiling techniques having O(n ) and O(n ) computational complexities. Based on the experiments of our proposed PRL performed on the PLI of AES-128 algorithm, the results depicting that the sampling points of PLI are reduced 87 percent after the k-NN variance clustering. The converged weight with learning error rate >10 traces, our proposed PRL is ∼2,000× more efficient in performing SCA. |
author2 |
School of Electrical and Electronic Engineering |
author_facet |
School of Electrical and Electronic Engineering Ali Akbar Pammu Chong, Kwen-Siong Wang, Yi Gwee, Bah-Hwee |
format |
Article |
author |
Ali Akbar Pammu Chong, Kwen-Siong Wang, Yi Gwee, Bah-Hwee |
author_sort |
Ali Akbar Pammu |
title |
A highly efficient side channel attack with profiling through relevance-learning on physical leakage information |
title_short |
A highly efficient side channel attack with profiling through relevance-learning on physical leakage information |
title_full |
A highly efficient side channel attack with profiling through relevance-learning on physical leakage information |
title_fullStr |
A highly efficient side channel attack with profiling through relevance-learning on physical leakage information |
title_full_unstemmed |
A highly efficient side channel attack with profiling through relevance-learning on physical leakage information |
title_sort |
highly efficient side channel attack with profiling through relevance-learning on physical leakage information |
publishDate |
2021 |
url |
https://hdl.handle.net/10356/150980 |
_version_ |
1702431304700657664 |