Multibyte Electromagnetic Analysis Based on Particle Swarm Optimization Algorithm

This paper focuses on electromagnetic information security in communication systems. Classical correlation electromagnetic analysis (CEMA) is known as a powerful way to recover the cryptographic algorithm’s key. In the classical method, only one byte of the key is used while the other bytes are considered as noise, which not only reduces the efficiency but also is a waste of information. In order to take full advantage of useful information, multiple bytes of the key are used. We transform the key into a multidimensional form, and each byte of the key is considered as a dimension. The problem of the right key searching is transformed into the problem of optimizing correlation coefficients of key candidates. The particle swarm optimization (PSO) algorithm is particularly more suited to solve the optimization problems with high dimension and complex structure. In this paper, we applied the PSO algorithm into CEMA to solve multidimensional problems, and we also add a mutation operator to the optimization algorithm to improve the result. Here, we have proposed a multibyte correlation electromagnetic analysis based on particle swarm optimization. We verified our method on a universal test board that is designed for research and development on hardware security. We implemented the Advanced Encryption Standard (AES) cryptographic algorithm on the test board. Experimental results have shown that our method outperforms the classical method; it achieves approximately 13.72% improvement for the corresponding case.

[1]  Ning Zhang,et al.  Multi-Byte Power Analysis: A Generic Approach Based on Linear Regression , 2018, IEEE Access.

[2]  Xueli Wang,et al.  An improved differential power analysis against random process interrupts , 2019, Journal of the Chinese Institute of Engineers.

[3]  Adel M. Alimi,et al.  PSO-based analysis of Echo State Network parameters for time series forecasting , 2017, Appl. Soft Comput..

[4]  William J Buchanan,et al.  Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA) , 2017 .

[5]  Michael Yonli A Comparison of Single-Bit and Multi-Bit DPA for Attacking AES128 on an ATmega328P , 2019, IACR Cryptol. ePrint Arch..

[6]  Yu-ichi Hayashi,et al.  Efficient Electromagnetic Analysis for Cryptographic Module on the Frequency Domain , 2016 .

[7]  Hervé Chabanne,et al.  Electromagnetic Side Channels of an FPGA Implementation of AES , 2004, IACR Cryptol. ePrint Arch..

[8]  Yu-ichi Hayashi,et al.  Introduction to Electromagnetic Information Security , 2019, IEICE Trans. Commun..

[9]  Rui Yao,et al.  A novel intelligent diagnosis method using optimal LS-SVM with improved PSO algorithm , 2017, Soft Computing.

[10]  Christof Paar,et al.  EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment , 2009, WISA.

[11]  Nan Zhang,et al.  Investigation of Unintentional Video Emanations From a VGA Connector in the Desktop Computers , 2017, IEEE Transactions on Electromagnetic Compatibility.

[12]  Pankaj Rohatgi,et al.  EMpowering Side-Channel Attacks , 2001, IACR Cryptology ePrint Archive.

[13]  Yu-ichi Hayashi,et al.  Remote Visualization of Screen Images Using a Pseudo-Antenna That Blends Into the Mobile Environment , 2017, IEEE Transactions on Electromagnetic Compatibility.

[14]  Pankaj Rohatgi,et al.  Introduction to differential power analysis , 2011, Journal of Cryptographic Engineering.

[15]  Francis Olivier,et al.  Electromagnetic Analysis: Concrete Results , 2001, CHES.

[16]  Liang Dong,et al.  A Novel Multi-Objective Electromagnetic Analysis Based on Genetic Algorithm , 2019, Sensors.

[17]  Haoran Zhang,et al.  Improved PSO-Based Method for Leak Detection and Localization in Liquid Pipelines , 2018, IEEE Transactions on Industrial Informatics.