Two Dimensional SOST: Extract Multi-Dimensional Leakage for Side-Channel Analysis on Cryptosystems

In 2021, Perin et al. proposed a horizontal attack framework against elliptic curve scalar multiplication (ECSM) operation based on the work of Nascimento et al. Their framework consists roughly of three steps. First, they apply k-means on the iteration traces from multiple ECSM executions, then, th...

Full description

Saved in:
Bibliographic Details
Published in2023 7th International Conference on Cryptography, Security and Privacy (CSP) pp. 1 - 6
Main Authors Liu, Zheng, Wei, Congming, Wen, Shengjun, Sun, Shaofei, Ding, Yaoling, Wang, An
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.04.2023
Subjects
Online AccessGet full text

Cover

Loading…
Abstract In 2021, Perin et al. proposed a horizontal attack framework against elliptic curve scalar multiplication (ECSM) operation based on the work of Nascimento et al. Their framework consists roughly of three steps. First, they apply k-means on the iteration traces from multiple ECSM executions, then, the results of clustering are used to make a leakage metric trace by using sum-of-squared t-values (SOST), based on the leakage metric trace, the points of interest (POI) are selected. Second, they apply k-means on those POIs to get initial labels for the scalar bits, the accuracy of initial labels is only 52%. Third, wrong bits are corrected by using an iterative deep learning framework. Our work focus on improving the horizontal attack framework by replacing SOST with our proposed two dimensional SOST (2D-SOST) to improve the efficiency of POI selection under unsupervised context. 2D-SOST can extract leakage information between dimensions while SOST can only extract information on one dimension which limits its performance. By replacing SOST with 2D-SOST, our method improves the accuracy of clustering algorithm from an average of 58% to an average of 74%. We also simplified the framework used in original paper and finally recover scalar bits successfully under the configuration where the original paper can not.
AbstractList In 2021, Perin et al. proposed a horizontal attack framework against elliptic curve scalar multiplication (ECSM) operation based on the work of Nascimento et al. Their framework consists roughly of three steps. First, they apply k-means on the iteration traces from multiple ECSM executions, then, the results of clustering are used to make a leakage metric trace by using sum-of-squared t-values (SOST), based on the leakage metric trace, the points of interest (POI) are selected. Second, they apply k-means on those POIs to get initial labels for the scalar bits, the accuracy of initial labels is only 52%. Third, wrong bits are corrected by using an iterative deep learning framework. Our work focus on improving the horizontal attack framework by replacing SOST with our proposed two dimensional SOST (2D-SOST) to improve the efficiency of POI selection under unsupervised context. 2D-SOST can extract leakage information between dimensions while SOST can only extract information on one dimension which limits its performance. By replacing SOST with 2D-SOST, our method improves the accuracy of clustering algorithm from an average of 58% to an average of 74%. We also simplified the framework used in original paper and finally recover scalar bits successfully under the configuration where the original paper can not.
Author Sun, Shaofei
Wang, An
Liu, Zheng
Wei, Congming
Wen, Shengjun
Ding, Yaoling
Author_xml – sequence: 1
  givenname: Zheng
  surname: Liu
  fullname: Liu, Zheng
  email: 3120201119@bit.edu.cn
  organization: School of Cyberspace Science and Technology, Beijing Institute of Technology,Beijing,China,100081
– sequence: 2
  givenname: Congming
  surname: Wei
  fullname: Wei, Congming
  email: cmwei06@163.com
  organization: School of Cyberspace Science and Technology, Beijing Institute of Technology,Beijing,China,100081
– sequence: 3
  givenname: Shengjun
  surname: Wen
  fullname: Wen, Shengjun
  email: wenshengjun@samr.gov.cn
  organization: Information Center, State Administration for Market Regulation,Beijing,China,100820
– sequence: 4
  givenname: Shaofei
  surname: Sun
  fullname: Sun, Shaofei
  email: sfsun@bit.edu.cn
  organization: School of Cyberspace Science and Technology, Beijing Institute of Technology,Beijing,China,100081
– sequence: 5
  givenname: Yaoling
  surname: Ding
  fullname: Ding, Yaoling
  email: dyl19@bit.edu.cn
  organization: School of Cyberspace Science and Technology, Beijing Institute of Technology,Beijing,China,100081
– sequence: 6
  givenname: An
  surname: Wang
  fullname: Wang, An
  email: wanganl@bit.edu.cn
  organization: School of Cyberspace Science and Technology, Beijing Institute of Technology,Beijing,China,100081
BookMark eNpNj81KxDAURiPoQsd5Al3kBTrmJk2buBvq-AOVEdr9cBtvNdimQ1PRvr0FXXg23-LAB-eCnYYhEGNXIDYAwt4U1Ys2xqQbKaTaiAVzwtY2t0ZpoaRSmTlnTf018DvfU4h-CNjxal_Vt3z3PY3oJv782U0--e9Lwg98I94OI6_8KyXFO4ZAHd8udo4-8iHwYpyP0xDnOFEfL9lZi12k9d-uWH2_q4vHpNw_PBXbMvEAdkqckNI1LjeNSC1C6iizeWqAALPGugYz6zBH51oEkFpkwjnXaI1SamhJrdj1760nosNx9D2O8wGWdm0B1A8ISlOq
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/CSP58884.2023.00008
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798350323368
EndPage 6
ExternalDocumentID 10235911
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i119t-c022cbc78b049a14ce697481e1a6b9cba69ca7accfa1125060cccb55a2251fe3
IEDL.DBID RIE
IngestDate Wed Sep 13 05:31:07 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i119t-c022cbc78b049a14ce697481e1a6b9cba69ca7accfa1125060cccb55a2251fe3
PageCount 6
ParticipantIDs ieee_primary_10235911
PublicationCentury 2000
PublicationDate 2023-April
PublicationDateYYYYMMDD 2023-04-01
PublicationDate_xml – month: 04
  year: 2023
  text: 2023-April
PublicationDecade 2020
PublicationTitle 2023 7th International Conference on Cryptography, Security and Privacy (CSP)
PublicationTitleAbbrev CSP
PublicationYear 2023
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8889438
Snippet In 2021, Perin et al. proposed a horizontal attack framework against elliptic curve scalar multiplication (ECSM) operation based on the work of Nascimento et...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Clustering algorithms
Data mining
Deep learning
Elliptic curves
horizontal attacks
Iterative methods
leakage detection
Measurement
Privacy
side-channel analysis
SOST
Title Two Dimensional SOST: Extract Multi-Dimensional Leakage for Side-Channel Analysis on Cryptosystems
URI https://ieeexplore.ieee.org/document/10235911
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ1LSwMxEMeD9uRJxYpvcvCattnuK15rSxGthV2ht5JMJlAqu6Xd4uPTm2RbXyB4W7KHhIRkZpL5_4aQ69QEESShYNyIDgtlEDOFHOy-0kYkBnXgi8E8jOLhU3g3iSYbsbrXwiCiTz7Dlvv0b_m6hLW7Kms7zEAknJJ3N-0EtVhrQxLiHdHuZePIBnTupiToejBh-qNmijcZg30y2nZWZ4rMW-tKteD9F4fx36M5IM0vdR4df9qdQ7KDxRFR-UtJbx2qv8Zs0Owxy29o_7VyMijqdbbs-_97lHN7llDrtNJsppE5nUGBz3SLKaFlQXvLt0VV1rTnVZPkg37eG7JN_QQ241xUDKx9BgVJqmwYIHkIGNvoIeXIZawEKBkLkIkEMNJ6XY40CAAqiqTd49xg95g0irLAE0KDMImMDiVwifZkBREn2A0M1yLRaJ2aU9J08zNd1ISM6XZqzv5oPyd7bo3qDJgL0qiWa7y0xr1SV35RPwDcKKcf
link.rule.ids 310,311,786,790,795,796,802,27956,55107
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3bS8MwFMaD6IM-qTjxbh58zbZ0vcXXuTF1m4NW2NtITk9gTNoxO7z89Sbp5g0E30r70JKQfOek5_sdQq5i7QUQ-YJxLZrMl17IFHIw6yrTItKYea4ZzGAY9h79u3EwXpnVnRcGEV3xGdbtpfuXnxWwtEdlDYsZCIR18m4ZoW9GlV1rxRLiTdFoJ6PApHT2rMRrOTRh_KNrihON7i4Zrl9X1YrM6stS1eH9F4nx39-zR2pf_jw6-lSefbKB-QFR6UtBbyysvwJt0OQhSa9p57W0RijqnLbs-_M-ypnZTagJW2kyzZBZp0GOT3QNKqFFTtuLt3lZVLzn5xpJu5203WOrDgpsyrkoGRiFBgVRrEwiILkPGJr8IebIZagEKBkKkJEE0NLEXZY1CAAqCKRZ5Vxj65Bs5kWOR4R6fhTozJfAJZq9FUQYYcvTPBNRhiasOSY1Oz6TecXImKyH5uSP-5dku5cO-pP-7fD-lOzY-arqYc7IZrlY4rmR-lJduAn-ANb6qnM
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+7th+International+Conference+on+Cryptography%2C+Security+and+Privacy+%28CSP%29&rft.atitle=Two+Dimensional+SOST%3A+Extract+Multi-Dimensional+Leakage+for+Side-Channel+Analysis+on+Cryptosystems&rft.au=Liu%2C+Zheng&rft.au=Wei%2C+Congming&rft.au=Wen%2C+Shengjun&rft.au=Sun%2C+Shaofei&rft.date=2023-04-01&rft.pub=IEEE&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FCSP58884.2023.00008&rft.externalDocID=10235911