Breaking Hardware Implementation of SM4 Algorithm using Principal Component Analysis and Machine Learning Classifiers

In this paper, we executed a power analysis of hardware implementation of SM4 algorithm using machine learning classifiers (support vector machine (SVMs), Decision Trees (DT), k-Nearest Neighbor, (KNN), Ensemble learning (EB), etc.). We first download hardware design to the FPGA in power acquisition platform based on SASEBO-G board to obtain the power traces of SM4 during its encryption process. Then we introduced a machine learning method to the Hamming-weight attack model of SM4 algorithm. In the data preprocessing phase, principal component analysis (PCA) method was applied, and we explored how many points of interested (PoIs) should we take to achieve the best test accuracy. We have tried different kinds of classifiers and their performance against Gaussian noise. The results show that for different classifiers, the number of PoIs selected when achieving maximum precision is different, PCA can reduce the dimensions of power trace effectively but probably decrease the test accuracy. Furthermore, most of these classifiers have excellent resolution (up to 100%) for Gaussian noise superimposed on the power traces, which means that machine learning classifiers such like SVM and Decision Trees can compete with template attacks based on Gaussian distribution.

[1]  Olivier Markowitch,et al.  Power analysis attack: an approach based on machine learning , 2014, Int. J. Appl. Cryptogr..

[2]  Carla E. Brodley,et al.  Multivariate decision trees , 2004, Machine Learning.

[3]  Corinna Cortes,et al.  Support-Vector Networks , 1995, Machine Learning.

[4]  Olivier Markowitch,et al.  A machine learning approach against a masked AES , 2014, Journal of Cryptographic Engineering.

[5]  Kerstin Lemke-Rust,et al.  Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines , 2012, CARDIS.

[6]  Saul B. Gelfand,et al.  Classification trees with neural network feature extraction , 1992, IEEE Trans. Neural Networks.

[7]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[8]  David Canright,et al.  A Very Compact S-Box for AES , 2005, CHES.