Combined Distinguishers to Enhance the Accuracy and Success of Side Channel Analysis

For the first time, the combination of mutual information analysis and correlation power analysis is proposed to enhance the accuracy and success rate of side channel analysis. Using the k-nearest-neighborhood (KNN) algorithm, correlation power analysis is combined with mutual information analysis to classify various possible keys to two classes of correct and wrong keys. The advantage of the combination of the distinguishers is two fold. First, the accuracy of the estimation is enhanced due to availability of multiple possible values for the correct key. Second, the number of measurements required to disclose the correct key is reduced by combining the distinguishers. The effectiveness of combined distinguisher is verified by extensive simulations. The number of measurements required to perform a side channel attack with a success rate of 90% is improved, respectively, by 20% and 49%, as compared to individual correlation power analysis and mutual information analysis.

[1]  Selçuk Köse,et al.  A Lightweight Masked AES Implementation for Securing IoT Against CPA Attacks , 2017, IEEE Transactions on Circuits and Systems I: Regular Papers.

[2]  Joydeep Ghosh,et al.  Cluster Ensembles --- A Knowledge Reuse Framework for Combining Multiple Partitions , 2002, J. Mach. Learn. Res..

[3]  Selçuk Köse,et al.  Security-Adaptive Voltage Conversion as a Lightweight Countermeasure Against LPA Attacks , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[4]  Selçuk Köse,et al.  Leveraging on-chip voltage regulators as a countermeasure against side-channel attacks , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[5]  Mircea R. Stan,et al.  Bus-invert coding for low-power I/O , 1995, IEEE Trans. Very Large Scale Integr. Syst..

[6]  Selçuk Köse,et al.  Exploiting Voltage Regulators to Enhance Various Power Attack Countermeasures , 2018, IEEE Transactions on Emerging Topics in Computing.

[7]  Günhan Dündar,et al.  Noise Analysis in Switched Capacitor Amplifier Based Sensors , 2017, 2017 New Generation of CAS (NGCAS).

[8]  Fathi Amsaad,et al.  Duty-Cycle-Based Controlled Physical Unclonable Function , 2018, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[9]  Sylvain Guilley,et al.  Side-channel analysis and machine learning: A practical perspective , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).

[10]  David R. Kaeli,et al.  A Timing Side-Channel Attack on a Mobile GPU , 2018, 2018 IEEE 36th International Conference on Computer Design (ICCD).

[11]  Selçuk Köse,et al.  Implications of noise insertion mechanisms of different countermeasures against side-channel attacks , 2017, 2017 IEEE International Symposium on Circuits and Systems (ISCAS).

[12]  Selçuk Köse,et al.  False Key-Controlled Aggressive Voltage Scaling: A Countermeasure Against LPA Attacks , 2017, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[13]  Jinyi Zhang,et al.  Reducing the Power Consumption of the AES S-Box by SSC , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[14]  Jiri Matas,et al.  On Combining Classifiers , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[15]  L. Benini,et al.  Energy-efficient data scrambling on memory-processor interfaces , 2003, Proceedings of the 2003 International Symposium on Low Power Electronics and Design, 2003. ISLPED '03..

[16]  Hossein Pishro-Nik,et al.  Matching Anonymized and Obfuscated Time Series to Users’ Profiles , 2017, IEEE Transactions on Information Theory.

[17]  Sylvain Guilley,et al.  On the optimality and practicability of mutual information analysis in some scenarios , 2016, Cryptography and Communications.

[18]  Sylvain Guilley,et al.  Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory , 2014, IACR Cryptol. ePrint Arch..

[19]  Selçuk Köse,et al.  A New Class of Covert Channels Exploiting Power Management Vulnerabilities , 2018, IEEE Computer Architecture Letters.

[20]  Bart Preneel,et al.  Mutual Information Analysis , 2008, CHES.

[21]  Christof Paar,et al.  A Comparative Study of Mutual Information Analysis under a Gaussian Assumption , 2009, WISA.

[22]  FRANÇOIS-XAVIER STANDAERT,et al.  An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays , 2006, Proceedings of the IEEE.

[23]  Claude Carlet,et al.  Stochastic Collision Attack , 2017, IEEE Transactions on Information Forensics and Security.

[24]  Christophe Clavier,et al.  Correlation Power Analysis with a Leakage Model , 2004, CHES.

[25]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[26]  Selcuk Kose,et al.  Security implications of simultaneous dynamic and leakage power analysis attacks on nanoscale cryptographic circuits , 2016 .