skip to main content
research-article

A Multiple Sieve Approach Based on Artificial Intelligent Techniques and Correlation Power Analysis

Published: 18 May 2021 Publication History

Abstract

Side-channel analysis achieves key recovery by analyzing physical signals generated during the operation of cryptographic devices. Power consumption is one kind of these signals and can be regarded as a multimedia form. In recent years, many artificial intelligence technologies have been combined with classical side-channel analysis methods to improve the efficiency and accuracy. A simple genetic algorithm was employed in Correlation Power Analysis (CPA) when apply to cryptographic algorithms implemented in parallel. However, premature convergence caused failure in recovering the whole key, especially when plenty of large S-boxes were employed in the target primitive, such as in the case of AES.
In this article, we investigate the reason of premature convergence and propose a Multiple Sieve Method (MS-CPA), which overcomes this problem and reduces the number of traces required in correlation power analysis. Our method can be adjusted to combine with key enumeration algorithms and further improves the efficiency. Simulation experimental results depict that our method reduces the required number of traces by and , compared to classic CPA and the Simple-Genetic-Algorithm-based CPA (SGA-CPA), respectively, when the success rate is fixed to . Real experiments performed on SAKURA-G confirm that the number of traces required for recovering the correct key in our method is almost equal to the minimum number that makes the correlation coefficients of correct keys stand out from the wrong ones and is much less than the numbers of traces required in CPA and SGA-CPA. When combining with key enumeration algorithms, our method has better performance. For the traces number being 200 (noise standard deviation ), the attacks success rate of our method is , which is much higher than the classic CPA with key enumeration ( success rate). Moreover, we adjust our method to work on that DPA contest v1 dataset and achieve a better result (40.04 traces) than the winning proposal (42.42 traces).

References

[1]
Timo Bartkewitz and Kerstin Lemke-Rust. 2012. Efficient template attacks based on probabilistic multi-class support vector machines. In Smart Card Research and Advanced Applications, Stefan Mangard (Ed.). Springer, Berlin, 263–276.
[2]
Daniel J. Bernstein, Tanja Lange, and Christine van Vredendaal. 2015. Tighter, faster, simpler side-channel security evaluations beyond computing power. IACR Cryptol. ePrint Arch. 2015 (2015), 221.
[3]
Andrey Bogdanov, Ilya Kizhvatov, Kamran Manzoor, Elmar Tischhauser, and Marc Witteman. 2016. Fast and memory-efficient key recovery in side-channel attacks. In Proceedings of the Annual Conference on Selected Areas in Cryptography (SAC’15), Orr Dunkelman and Liam Keliher (Eds.). Springer International Publishing, Cham, 310–327.
[4]
Eric Brier, Christophe Clavier, and Francis Olivier. 2004. Correlation power analysis with a leakage model. In Proceedings of the Annual Conference on Cryptographic Hardware and Embedded Systems - CHES 2004, Marc Joye and Jean-Jacques Quisquater (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 16–29.
[5]
Eleonora Cagli, Cécile Dumas, and Emmanuel Prouff. 2017. Convolutional neural networks with data augmentation against jitter-based countermeasures - Profiling attacks without pre-processing. In Proceedings of the Annual Conference on Cryptographic Hardware and Embedded Systems - CHES 2017, Wieland Fischer and Naofumi Homma (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 45–68.
[6]
Suresh Chari, Josyula R. Rao, and Pankaj Rohatgi. 2002. Template attacks. In Proceedings of the Annual Conference on Cryptographic Hardware and Embedded Systems - CHES 2002, Burton S. Kaliski, çetin K. Koç, and Christof Paar (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 13–28.
[7]
Christophe Clavier. 2009. Less than 50 traces allow to recover the key. CHES Special Session 1 (2009).
[8]
Christophe Clavier and Djamal Rebaine. 2016. A heuristic approach to assist side channel analysis of the data encryption standard. In The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday (Lecture Notes in Computer Science), Peter Y. A. Ryan, David Naccache, and Jean-Jacques Quisquater (Eds.), Vol. 9100. Springer, 355–373.
[9]
Joan Daemen and Vincent Rijmen. 2002. The Design of Rijndael: AES - The Advanced Encryption Standard. Springer Berlin Heidelberg.
[10]
Liron David and Avishai Wool. 2017. A bounded-space near-optimal key enumeration algorithm for multi-subkey side-channel attacks. In Cryptographers’ Track at the RSA Conference. Springer, 311–327.
[11]
Yaoling Ding, Ying Shi, An Wang, Yongjuan Wang, and Guoshuang Zhang. 2020. Block-oriented correlation power analysis with bitwise linear leakage: An artificial intelligence approach based on genetic algorithms. Future Generation Computer Systems 106 (2020), 34–42.
[12]
Alexandre Duc, Sebastian Faust, and François-Xavier Standaert. 2015. Making masking security proofs concrete. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 401–429.
[13]
Benedikt Gierlichs, Lejla Batina, Pim Tuyls, and Bart Preneel. 2008. Mutual information analysis. In Proceedings of the Annual Conference on Cryptographic Hardware and Embedded Systems - CHES 2008, Elisabeth Oswald and Pankaj Rohatgi (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 426–442.
[14]
Cezary Glowacz, Vincent Grosso, Romain Poussier, Joachim Schüth, and François-Xavier Standaert. 2015. Simpler and more efficient rank estimation for side-channel security assessment. In Proceedings of the International Workshop on Fast Software Encryption. Springer, 117–129.
[15]
TELECOM ParisTech SEN Research Group. 2008. DPA Contest (1st edition) (2008-2009). http://www.dpacontest.org.
[16]
Annelie Heuser, Stjepan Picek, Sylvain Guilley, and Nele Mentens. 2017. Lightweight ciphers and their side-channel resilience. IEEE Trans. Comput. (2017), 1.
[17]
Annelie Heuser and Michael Zohner. 2012. Intelligent machine homicide - Breaking cryptographic devices using support vector machines. In Constructive Side-Channel Analysis and Secure Design, Werner Schindler and Sorin A. Huss (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 249–264.
[18]
Johann Heyszl, Andreas Ibing, Stefan Mangard, Fabrizio De Santis, and Georg Sigl. 2013. Clustering algorithms for non-profiled single-execution attacks on exponentiations. In Proceedings of the International Conference on Smart Card Research and Advanced Applications. Springer, 79–93.
[19]
John Henry Holland. 1975. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence. University of Michigan Press, Ann Arbor, MI.
[20]
Gabriel Hospodar, E. D. Mulder, Benedikt Gierlichs, Ingrid Verbauwhede, and Joos Vandewalle. 2011. Least squares support vector machines for side-channel analysis. In Proceedings of the Second International Workshop on Constructive SideChannel Analysis and Secure Design. Center for Advanced Security Research, Darmstadt, 99–104.
[21]
Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential power analysis. In Proceedings of the Annual Conference on Advances in Cryptology - CRYPTO’99, Michael Wiener (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 388–397.
[22]
Thanh-Ha Le, Jessy Clédière, Cécile Canovas, Bruno Robisson, Christine Servière, and Jean-Louis Lacoume. 2006. A proposition for correlation power analysis enhancement. In Proceedings of the Annual Conference on Cryptographic Hardware and Embedded Systems - CHES 2006, Louis Goubin and Mitsuru Matsui (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 174–186.
[23]
Kerstin Lemke-Rust and Christof Paar. 2007. Gaussian mixture models for higher-order side channel analysis. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 14–27.
[24]
Liran Lerman, Gianluca Bontempi, and Olivier Markowitch. 2011. Side channel attack: An approach based on machine learning. In Proceedings of the Second International Workshop on Constructive Side Channel Analysis and Secure Design. Center for Advanced Security Research, Darmstadt, 29–41.
[25]
Liran Lerman, Stephane Fernandes Medeiros, Nikita Veshchikov, Cédric Meuter, Gianluca Bontempi, and Olivier Markowitch. 2013. Semi-supervised template attack. In Constructive Side-Channel Analysis and Secure Design, Emmanuel Prouff (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 184–199.
[26]
Jake Longo, Daniel P. Martin, Luke Mather, Elisabeth Oswald, Benjamin Sach, and Martijn Stam. 2016. How low can you go? Using side-channel data to enhance brute-force key recovery. IACR Cryptology ePrint Archive 2016 (2016), 609.
[27]
Daniel P. Martin, Jonathan F. O’Connell, Elisabeth Oswald, and Martijn Stam. 2015. Counting keys in parallel after a side channel attack. In Proceedings of the Annual Conference on Advances in Cryptology – ASIACRYPT 2015, Tetsu Iwata and Jung Hee Cheon (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 313–337.
[28]
Zdenek Martinasek and Vaclav Zeman. 2013. Innovative method of the power analysis. Radioengineering 22, 2 (2013), 586–594.
[29]
Thomas S. Messerges and Ezzy A. Dabbish. 1999. Investigations of power analysis attacks on smartcards. Proceedings of the Usenix Workshop on Smartcard Technology (1999).
[30]
Heinz Mühlenbein, M. Schomisch, and Joachim Born. 1991. The parallel genetic algorithm as function optimizer. Parallel Computing 17, 6–7 (1991), 619–632.
[31]
National Bureau of Standards. 1977. Data Sncryption standard. Federal Information Processing Standards Publications (1977).
[32]
Stjepan Picek, Annelie Heuser, Alan Jovic, Simone A. Ludwig, Sylvain Guilley, Domagoj Jakobovic, and Nele Mentens. 2017. Side-channel analysis and machine learning: A practical perspective. In Proceedings of the 2017 International Joint Conference on Neural Networks (IJCNN). 4095–4102.
[33]
Romain Poussier, Vincent Grosso, and François-Xavier Standaert. 2015. Comparing approaches to rank estimation for side-channel security evaluations. In Proceedings of the International Conference on Smart Card Research and Advanced Applications. Springer, 125–142.
[34]
Romain Poussier, François-Xavier Standaert, and Vincent Grosso. 2016. Simple key enumeration (and rank estimation) using histograms: An integrated approach. In Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems. Springer, 61–81.
[35]
Kai Schramm, Thomas J. Wollinger, and Christof Paar. 2003. A new class of collision attacks and its application to DES. In Fast Software Encryption, Thomas Johansson (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 206–222.
[36]
Benjamin Timon. 2019. Non-profiled deep learning-based side-channel attacks with sensitivity analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems 2019, 2 (2019), 107–131.
[37]
Nicolas Veyrat-Charvillon, Benoît Gérard, Mathieu Renauld, and François-Xavier Standaert. 2012. An optimal key enumeration algorithm and its application to side-channel attacks. In Proceedings of the International Conference on Selected Areas in Cryptography. Springer, 390–406.
[38]
Nicolas Veyrat-Charvillon, Benoît Gérard, and François-Xavier Standaert. 2013. Security evaluations beyond computing power. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 126–141.
[39]
Xin Ye, Thomas Eisenbarth, and William Martin. 2015. Bounded, yet sufficient? How to determine whether limited side channel information enables key recovery. In Smart Card Research and Advanced Applications, Marc Joye and Amir Moradi (Eds.). Springer International Publishing, Cham, 215–232.
[40]
Zhenbin Zhang, Liji Wu, An Wang, Zhaoli Mu, and Xiangmin Zhang. 2015. A novel bit scalable leakage model based on genetic algorithm. Security and Communication Networks 8, 18 (2015), 3896–3905.

Cited By

View all
  • (2024)Efficient Multi-Byte Power Analysis Architecture Focusing on Bitwise Linear LeakageACM Transactions on Embedded Computing Systems10.1145/368748423:6(1-25)Online publication date: 22-Aug-2024
  • (2023)CoTree: A Side-Channel Collision Tool to Push the Limits of Conquerable SpaceIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2023.328851242:12(4505-4517)Online publication date: 21-Jun-2023
  • (2023)Fault Probability Correlation Analysis Based on Secondary FilteringIEEE Access10.1109/ACCESS.2023.332169611(113402-113409)Online publication date: 2023
  • Show More Cited By

Index Terms

  1. A Multiple Sieve Approach Based on Artificial Intelligent Techniques and Correlation Power Analysis

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Multimedia Computing, Communications, and Applications
    ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 17, Issue 2s
    June 2021
    349 pages
    ISSN:1551-6857
    EISSN:1551-6865
    DOI:10.1145/3465440
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 18 May 2021
    Accepted: 01 November 2020
    Revised: 01 October 2020
    Received: 01 May 2020
    Published in TOMM Volume 17, Issue 2s

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Multiple sieve
    2. genetic algorithm
    3. correlation power analysis
    4. parallel implementation
    5. AES

    Qualifiers

    • Research-article
    • Refereed

    Funding Sources

    • Beijing Natural Science Foundation
    • National Natural Science Foundation of China
    • National Cryptography Development Fund
    • Henan Key Laboratory of Network Cryptography Technology

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)8
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 03 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Efficient Multi-Byte Power Analysis Architecture Focusing on Bitwise Linear LeakageACM Transactions on Embedded Computing Systems10.1145/368748423:6(1-25)Online publication date: 22-Aug-2024
    • (2023)CoTree: A Side-Channel Collision Tool to Push the Limits of Conquerable SpaceIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2023.328851242:12(4505-4517)Online publication date: 21-Jun-2023
    • (2023)Fault Probability Correlation Analysis Based on Secondary FilteringIEEE Access10.1109/ACCESS.2023.332169611(113402-113409)Online publication date: 2023
    • (2022)Correlation Power Analysis and Protected Implementation on Lightweight Block Cipher FESH2022 IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)10.1109/BigDataSecurityHPSCIDS54978.2022.00016(29-34)Online publication date: May-2022
    • (2021)Revisiting System Noise in Side-Channel Attacks: Mutual Assistant SCA vs. Genetic Algorithm2021 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)10.1109/AsianHOST53231.2021.9699725(1-6)Online publication date: 16-Dec-2021

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media