Two Dimensional SOST: Extract Multi-Dimensional Leakage for Side-Channel Analysis on Cryptosystems
In 2021, Perin et al. proposed a horizontal attack framework against elliptic curve scalar multiplication (ECSM) operation based on the work of Nascimento et al. Their framework consists roughly of three steps. First, they apply k-means on the iteration traces from multiple ECSM executions, then, th...
Saved in:
Published in | 2023 7th International Conference on Cryptography, Security and Privacy (CSP) pp. 1 - 6 |
---|---|
Main Authors | , , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.04.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | In 2021, Perin et al. proposed a horizontal attack framework against elliptic curve scalar multiplication (ECSM) operation based on the work of Nascimento et al. Their framework consists roughly of three steps. First, they apply k-means on the iteration traces from multiple ECSM executions, then, the results of clustering are used to make a leakage metric trace by using sum-of-squared t-values (SOST), based on the leakage metric trace, the points of interest (POI) are selected. Second, they apply k-means on those POIs to get initial labels for the scalar bits, the accuracy of initial labels is only 52%. Third, wrong bits are corrected by using an iterative deep learning framework. Our work focus on improving the horizontal attack framework by replacing SOST with our proposed two dimensional SOST (2D-SOST) to improve the efficiency of POI selection under unsupervised context. 2D-SOST can extract leakage information between dimensions while SOST can only extract information on one dimension which limits its performance. By replacing SOST with 2D-SOST, our method improves the accuracy of clustering algorithm from an average of 58% to an average of 74%. We also simplified the framework used in original paper and finally recover scalar bits successfully under the configuration where the original paper can not. |
---|---|
AbstractList | In 2021, Perin et al. proposed a horizontal attack framework against elliptic curve scalar multiplication (ECSM) operation based on the work of Nascimento et al. Their framework consists roughly of three steps. First, they apply k-means on the iteration traces from multiple ECSM executions, then, the results of clustering are used to make a leakage metric trace by using sum-of-squared t-values (SOST), based on the leakage metric trace, the points of interest (POI) are selected. Second, they apply k-means on those POIs to get initial labels for the scalar bits, the accuracy of initial labels is only 52%. Third, wrong bits are corrected by using an iterative deep learning framework. Our work focus on improving the horizontal attack framework by replacing SOST with our proposed two dimensional SOST (2D-SOST) to improve the efficiency of POI selection under unsupervised context. 2D-SOST can extract leakage information between dimensions while SOST can only extract information on one dimension which limits its performance. By replacing SOST with 2D-SOST, our method improves the accuracy of clustering algorithm from an average of 58% to an average of 74%. We also simplified the framework used in original paper and finally recover scalar bits successfully under the configuration where the original paper can not. |
Author | Sun, Shaofei Wang, An Liu, Zheng Wei, Congming Wen, Shengjun Ding, Yaoling |
Author_xml | – sequence: 1 givenname: Zheng surname: Liu fullname: Liu, Zheng email: 3120201119@bit.edu.cn organization: School of Cyberspace Science and Technology, Beijing Institute of Technology,Beijing,China,100081 – sequence: 2 givenname: Congming surname: Wei fullname: Wei, Congming email: cmwei06@163.com organization: School of Cyberspace Science and Technology, Beijing Institute of Technology,Beijing,China,100081 – sequence: 3 givenname: Shengjun surname: Wen fullname: Wen, Shengjun email: wenshengjun@samr.gov.cn organization: Information Center, State Administration for Market Regulation,Beijing,China,100820 – sequence: 4 givenname: Shaofei surname: Sun fullname: Sun, Shaofei email: sfsun@bit.edu.cn organization: School of Cyberspace Science and Technology, Beijing Institute of Technology,Beijing,China,100081 – sequence: 5 givenname: Yaoling surname: Ding fullname: Ding, Yaoling email: dyl19@bit.edu.cn organization: School of Cyberspace Science and Technology, Beijing Institute of Technology,Beijing,China,100081 – sequence: 6 givenname: An surname: Wang fullname: Wang, An email: wanganl@bit.edu.cn organization: School of Cyberspace Science and Technology, Beijing Institute of Technology,Beijing,China,100081 |
BookMark | eNpNj81KxDAURiPoQsd5Al3kBTrmJk2buBvq-AOVEdr9cBtvNdimQ1PRvr0FXXg23-LAB-eCnYYhEGNXIDYAwt4U1Ys2xqQbKaTaiAVzwtY2t0ZpoaRSmTlnTf018DvfU4h-CNjxal_Vt3z3PY3oJv782U0--e9Lwg98I94OI6_8KyXFO4ZAHd8udo4-8iHwYpyP0xDnOFEfL9lZi12k9d-uWH2_q4vHpNw_PBXbMvEAdkqckNI1LjeNSC1C6iizeWqAALPGugYz6zBH51oEkFpkwjnXaI1SamhJrdj1760nosNx9D2O8wGWdm0B1A8ISlOq |
CODEN | IEEPAD |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/CSP58884.2023.00008 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9798350323368 |
EndPage | 6 |
ExternalDocumentID | 10235911 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i119t-c022cbc78b049a14ce697481e1a6b9cba69ca7accfa1125060cccb55a2251fe3 |
IEDL.DBID | RIE |
IngestDate | Wed Sep 13 05:31:07 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i119t-c022cbc78b049a14ce697481e1a6b9cba69ca7accfa1125060cccb55a2251fe3 |
PageCount | 6 |
ParticipantIDs | ieee_primary_10235911 |
PublicationCentury | 2000 |
PublicationDate | 2023-April |
PublicationDateYYYYMMDD | 2023-04-01 |
PublicationDate_xml | – month: 04 year: 2023 text: 2023-April |
PublicationDecade | 2020 |
PublicationTitle | 2023 7th International Conference on Cryptography, Security and Privacy (CSP) |
PublicationTitleAbbrev | CSP |
PublicationYear | 2023 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.8889438 |
Snippet | In 2021, Perin et al. proposed a horizontal attack framework against elliptic curve scalar multiplication (ECSM) operation based on the work of Nascimento et... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Clustering algorithms Data mining Deep learning Elliptic curves horizontal attacks Iterative methods leakage detection Measurement Privacy side-channel analysis SOST |
Title | Two Dimensional SOST: Extract Multi-Dimensional Leakage for Side-Channel Analysis on Cryptosystems |
URI | https://ieeexplore.ieee.org/document/10235911 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ1LSwMxEMeD9uRJxYpvcvCattnuK15rSxGthV2ht5JMJlAqu6Xd4uPTm2RbXyB4W7KHhIRkZpL5_4aQ69QEESShYNyIDgtlEDOFHOy-0kYkBnXgi8E8jOLhU3g3iSYbsbrXwiCiTz7Dlvv0b_m6hLW7Kms7zEAknJJ3N-0EtVhrQxLiHdHuZePIBnTupiToejBh-qNmijcZg30y2nZWZ4rMW-tKteD9F4fx36M5IM0vdR4df9qdQ7KDxRFR-UtJbx2qv8Zs0Owxy29o_7VyMijqdbbs-_97lHN7llDrtNJsppE5nUGBz3SLKaFlQXvLt0VV1rTnVZPkg37eG7JN_QQ241xUDKx9BgVJqmwYIHkIGNvoIeXIZawEKBkLkIkEMNJ6XY40CAAqiqTd49xg95g0irLAE0KDMImMDiVwifZkBREn2A0M1yLRaJ2aU9J08zNd1ISM6XZqzv5oPyd7bo3qDJgL0qiWa7y0xr1SV35RPwDcKKcf |
link.rule.ids | 310,311,786,790,795,796,802,27956,55107 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3bS8MwFMaD6IM-qTjxbh58zbZ0vcXXuTF1m4NW2NtITk9gTNoxO7z89Sbp5g0E30r70JKQfOek5_sdQq5i7QUQ-YJxLZrMl17IFHIw6yrTItKYea4ZzGAY9h79u3EwXpnVnRcGEV3xGdbtpfuXnxWwtEdlDYsZCIR18m4ZoW9GlV1rxRLiTdFoJ6PApHT2rMRrOTRh_KNrihON7i4Zrl9X1YrM6stS1eH9F4nx39-zR2pf_jw6-lSefbKB-QFR6UtBbyysvwJt0OQhSa9p57W0RijqnLbs-_M-ypnZTagJW2kyzZBZp0GOT3QNKqFFTtuLt3lZVLzn5xpJu5203WOrDgpsyrkoGRiFBgVRrEwiILkPGJr8IebIZagEKBkKkJEE0NLEXZY1CAAqCKRZ5Vxj65Bs5kWOR4R6fhTozJfAJZq9FUQYYcvTPBNRhiasOSY1Oz6TecXImKyH5uSP-5dku5cO-pP-7fD-lOzY-arqYc7IZrlY4rmR-lJduAn-ANb6qnM |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+7th+International+Conference+on+Cryptography%2C+Security+and+Privacy+%28CSP%29&rft.atitle=Two+Dimensional+SOST%3A+Extract+Multi-Dimensional+Leakage+for+Side-Channel+Analysis+on+Cryptosystems&rft.au=Liu%2C+Zheng&rft.au=Wei%2C+Congming&rft.au=Wen%2C+Shengjun&rft.au=Sun%2C+Shaofei&rft.date=2023-04-01&rft.pub=IEEE&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FCSP58884.2023.00008&rft.externalDocID=10235911 |