Abstract
Side-channel analysis achieves key recovery by analyzing physical signals generated during the operation of cryptographic devices. Power consumption is one kind of these signals and can be regarded as a multimedia form. In recent years, many artificial intelligence technologies have been combined with classical side-channel analysis methods to improve the efficiency and accuracy. A simple genetic algorithm was employed in Correlation Power Analysis (CPA) when apply to cryptographic algorithms implemented in parallel. However, premature convergence caused failure in recovering the whole key, especially when plenty of large S-boxes were employed in the target primitive, such as in the case of AES.
In this article, we investigate the reason of premature convergence and propose a Multiple Sieve Method (MS-CPA), which overcomes this problem and reduces the number of traces required in correlation power analysis. Our method can be adjusted to combine with key enumeration algorithms and further improves the efficiency. Simulation experimental results depict that our method reduces the required number of traces by \(\) and \(\), compared to classic CPA and the Simple-Genetic-Algorithm-based CPA (SGA-CPA), respectively, when the success rate is fixed to \(\). Real experiments performed on SAKURA-G confirm that the number of traces required for recovering the correct key in our method is almost equal to the minimum number that makes the correlation coefficients of correct keys stand out from the wrong ones and is much less than the numbers of traces required in CPA and SGA-CPA. When combining with key enumeration algorithms, our method has better performance. For the traces number being 200 (noise standard deviation \(\)), the attacks success rate of our method is \(\), which is much higher than the classic CPA with key enumeration (\(\) success rate). Moreover, we adjust our method to work on that DPA contest v1 dataset and achieve a better result (40.04 traces) than the winning proposal (42.42 traces).
- Timo Bartkewitz and Kerstin Lemke-Rust. 2012. Efficient template attacks based on probabilistic multi-class support vector machines. In Smart Card Research and Advanced Applications, Stefan Mangard (Ed.). Springer, Berlin, 263–276. Google Scholar
Digital Library
- Daniel J. Bernstein, Tanja Lange, and Christine van Vredendaal. 2015. Tighter, faster, simpler side-channel security evaluations beyond computing power. IACR Cryptol. ePrint Arch. 2015 (2015), 221.Google Scholar
- Andrey Bogdanov, Ilya Kizhvatov, Kamran Manzoor, Elmar Tischhauser, and Marc Witteman. 2016. Fast and memory-efficient key recovery in side-channel attacks. In Proceedings of the Annual Conference on Selected Areas in Cryptography (SAC’15), Orr Dunkelman and Liam Keliher (Eds.). Springer International Publishing, Cham, 310–327. Google Scholar
Digital Library
- Eric Brier, Christophe Clavier, and Francis Olivier. 2004. Correlation power analysis with a leakage model. In Proceedings of the Annual Conference on Cryptographic Hardware and Embedded Systems - CHES 2004, Marc Joye and Jean-Jacques Quisquater (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 16–29.Google Scholar
Cross Ref
- Eleonora Cagli, Cécile Dumas, and Emmanuel Prouff. 2017. Convolutional neural networks with data augmentation against jitter-based countermeasures - Profiling attacks without pre-processing. In Proceedings of the Annual Conference on Cryptographic Hardware and Embedded Systems - CHES 2017, Wieland Fischer and Naofumi Homma (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 45–68.Google Scholar
- Suresh Chari, Josyula R. Rao, and Pankaj Rohatgi. 2002. Template attacks. In Proceedings of the Annual Conference on Cryptographic Hardware and Embedded Systems - CHES 2002, Burton S. Kaliski, çetin K. Koç, and Christof Paar (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 13–28. Google Scholar
Digital Library
- Christophe Clavier. 2009. Less than 50 traces allow to recover the key. CHES Special Session 1 (2009).Google Scholar
- Christophe Clavier and Djamal Rebaine. 2016. A heuristic approach to assist side channel analysis of the data encryption standard. In The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday (Lecture Notes in Computer Science), Peter Y. A. Ryan, David Naccache, and Jean-Jacques Quisquater (Eds.), Vol. 9100. Springer, 355–373. Google Scholar
Digital Library
- Joan Daemen and Vincent Rijmen. 2002. The Design of Rijndael: AES - The Advanced Encryption Standard. Springer Berlin Heidelberg. Google Scholar
Digital Library
- Liron David and Avishai Wool. 2017. A bounded-space near-optimal key enumeration algorithm for multi-subkey side-channel attacks. In Cryptographers’ Track at the RSA Conference. Springer, 311–327.Google Scholar
- Yaoling Ding, Ying Shi, An Wang, Yongjuan Wang, and Guoshuang Zhang. 2020. Block-oriented correlation power analysis with bitwise linear leakage: An artificial intelligence approach based on genetic algorithms. Future Generation Computer Systems 106 (2020), 34–42.Google Scholar
Cross Ref
- Alexandre Duc, Sebastian Faust, and François-Xavier Standaert. 2015. Making masking security proofs concrete. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 401–429.Google Scholar
Cross Ref
- Benedikt Gierlichs, Lejla Batina, Pim Tuyls, and Bart Preneel. 2008. Mutual information analysis. In Proceedings of the Annual Conference on Cryptographic Hardware and Embedded Systems - CHES 2008, Elisabeth Oswald and Pankaj Rohatgi (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 426–442. Google Scholar
Digital Library
- Cezary Glowacz, Vincent Grosso, Romain Poussier, Joachim Schüth, and François-Xavier Standaert. 2015. Simpler and more efficient rank estimation for side-channel security assessment. In Proceedings of the International Workshop on Fast Software Encryption. Springer, 117–129.Google Scholar
Cross Ref
- TELECOM ParisTech SEN Research Group. 2008. DPA Contest (1st edition) (2008-2009). http://www.dpacontest.org.Google Scholar
- Annelie Heuser, Stjepan Picek, Sylvain Guilley, and Nele Mentens. 2017. Lightweight ciphers and their side-channel resilience. IEEE Trans. Comput. (2017), 1.Google Scholar
Cross Ref
- Annelie Heuser and Michael Zohner. 2012. Intelligent machine homicide - Breaking cryptographic devices using support vector machines. In Constructive Side-Channel Analysis and Secure Design, Werner Schindler and Sorin A. Huss (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 249–264. Google Scholar
Digital Library
- Johann Heyszl, Andreas Ibing, Stefan Mangard, Fabrizio De Santis, and Georg Sigl. 2013. Clustering algorithms for non-profiled single-execution attacks on exponentiations. In Proceedings of the International Conference on Smart Card Research and Advanced Applications. Springer, 79–93.Google Scholar
- John Henry Holland. 1975. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence. University of Michigan Press, Ann Arbor, MI.Google Scholar
- Gabriel Hospodar, E. D. Mulder, Benedikt Gierlichs, Ingrid Verbauwhede, and Joos Vandewalle. 2011. Least squares support vector machines for side-channel analysis. In Proceedings of the Second International Workshop on Constructive SideChannel Analysis and Secure Design. Center for Advanced Security Research, Darmstadt, 99–104.Google Scholar
- Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential power analysis. In Proceedings of the Annual Conference on Advances in Cryptology - CRYPTO’99, Michael Wiener (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 388–397. Google Scholar
Digital Library
- Thanh-Ha Le, Jessy Clédière, Cécile Canovas, Bruno Robisson, Christine Servière, and Jean-Louis Lacoume. 2006. A proposition for correlation power analysis enhancement. In Proceedings of the Annual Conference on Cryptographic Hardware and Embedded Systems - CHES 2006, Louis Goubin and Mitsuru Matsui (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 174–186. Google Scholar
Digital Library
- Kerstin Lemke-Rust and Christof Paar. 2007. Gaussian mixture models for higher-order side channel analysis. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 14–27. Google Scholar
Digital Library
- Liran Lerman, Gianluca Bontempi, and Olivier Markowitch. 2011. Side channel attack: An approach based on machine learning. In Proceedings of the Second International Workshop on Constructive Side Channel Analysis and Secure Design. Center for Advanced Security Research, Darmstadt, 29–41.Google Scholar
- Liran Lerman, Stephane Fernandes Medeiros, Nikita Veshchikov, Cédric Meuter, Gianluca Bontempi, and Olivier Markowitch. 2013. Semi-supervised template attack. In Constructive Side-Channel Analysis and Secure Design, Emmanuel Prouff (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 184–199. Google Scholar
Digital Library
- Jake Longo, Daniel P. Martin, Luke Mather, Elisabeth Oswald, Benjamin Sach, and Martijn Stam. 2016. How low can you go? Using side-channel data to enhance brute-force key recovery. IACR Cryptology ePrint Archive 2016 (2016), 609.Google Scholar
- Daniel P. Martin, Jonathan F. O’Connell, Elisabeth Oswald, and Martijn Stam. 2015. Counting keys in parallel after a side channel attack. In Proceedings of the Annual Conference on Advances in Cryptology – ASIACRYPT 2015, Tetsu Iwata and Jung Hee Cheon (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 313–337. Google Scholar
Digital Library
- Zdenek Martinasek and Vaclav Zeman. 2013. Innovative method of the power analysis. Radioengineering 22, 2 (2013), 586–594.Google Scholar
- Thomas S. Messerges and Ezzy A. Dabbish. 1999. Investigations of power analysis attacks on smartcards. Proceedings of the Usenix Workshop on Smartcard Technology (1999). Google Scholar
Digital Library
- Heinz Mühlenbein, M. Schomisch, and Joachim Born. 1991. The parallel genetic algorithm as function optimizer. Parallel Computing 17, 6–7 (1991), 619–632. Google Scholar
Digital Library
- National Bureau of Standards. 1977. Data Sncryption standard. Federal Information Processing Standards Publications (1977).Google Scholar
- Stjepan Picek, Annelie Heuser, Alan Jovic, Simone A. Ludwig, Sylvain Guilley, Domagoj Jakobovic, and Nele Mentens. 2017. Side-channel analysis and machine learning: A practical perspective. In Proceedings of the 2017 International Joint Conference on Neural Networks (IJCNN). 4095–4102.Google Scholar
Cross Ref
- Romain Poussier, Vincent Grosso, and François-Xavier Standaert. 2015. Comparing approaches to rank estimation for side-channel security evaluations. In Proceedings of the International Conference on Smart Card Research and Advanced Applications. Springer, 125–142. Google Scholar
Digital Library
- Romain Poussier, François-Xavier Standaert, and Vincent Grosso. 2016. Simple key enumeration (and rank estimation) using histograms: An integrated approach. In Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems. Springer, 61–81.Google Scholar
Cross Ref
- Kai Schramm, Thomas J. Wollinger, and Christof Paar. 2003. A new class of collision attacks and its application to DES. In Fast Software Encryption, Thomas Johansson (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 206–222.Google Scholar
- Benjamin Timon. 2019. Non-profiled deep learning-based side-channel attacks with sensitivity analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems 2019, 2 (2019), 107–131.Google Scholar
Cross Ref
- Nicolas Veyrat-Charvillon, Benoît Gérard, Mathieu Renauld, and François-Xavier Standaert. 2012. An optimal key enumeration algorithm and its application to side-channel attacks. In Proceedings of the International Conference on Selected Areas in Cryptography. Springer, 390–406.Google Scholar
- Nicolas Veyrat-Charvillon, Benoît Gérard, and François-Xavier Standaert. 2013. Security evaluations beyond computing power. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 126–141.Google Scholar
Cross Ref
- Xin Ye, Thomas Eisenbarth, and William Martin. 2015. Bounded, yet sufficient? How to determine whether limited side channel information enables key recovery. In Smart Card Research and Advanced Applications, Marc Joye and Amir Moradi (Eds.). Springer International Publishing, Cham, 215–232.Google Scholar
- Zhenbin Zhang, Liji Wu, An Wang, Zhaoli Mu, and Xiangmin Zhang. 2015. A novel bit scalable leakage model based on genetic algorithm. Security and Communication Networks 8, 18 (2015), 3896–3905. Google Scholar
Digital Library
Index Terms
A Multiple Sieve Approach Based on Artificial Intelligent Techniques and Correlation Power Analysis
Recommendations
Block-oriented correlation power analysis with bitwise linear leakage: An artificial intelligence approach based on genetic algorithms
AbstractCorrelation power analysis (CPA) is known as a powerful method used to launch side-channel attacks on cryptographic devices. In the classic approach, the key is recovered word by word, whose length is usually determined by S-box. For ...
Highlights- A new method combining Correlation Power Analysis (CPA) with genetic algorithms is proposed.
Efficient algorithmic evaluation of correlation power analysis: Key distinguisher based on the correlation trace derivative
AbstractCorrelation power analysis (CPA) is one of the most common side-channel attacks today, posing a threat to many modern ciphers, including AES. In the final step of this attack, the cipher key is usually extracted by the attacker by ...
A proposition for correlation power analysis enhancement
CHES'06: Proceedings of the 8th international conference on Cryptographic Hardware and Embedded SystemsCryptographic devices are vulnerable to the nowadays well known side channel leakage analysis. Secret data can be revealed by power analysis attacks such as Simple Power Analysis (SPA), Differential Power Analysis (DPA) and Correlation Power Analysis (...






Comments