2018
DOI: 10.46586/tches.v2019.i1.1-24
|View full text |Cite
|
Sign up to set email alerts
|

Improving CEMA using Correlation Optimization

Abstract: Sensitive cryptographic information, e.g. AES secret keys, can be extracted from the electromagnetic (EM) leakages unintentionally emitted by a device using techniques such as Correlation Electromagnetic Analysis (CEMA). In this paper, we introduce Correlation Optimization (CO), a novel approach that improves CEMA attacks by formulating the selection of useful EM leakage samples in a trace as a machine learning optimization problem. To this end, we propose the correlation loss function, which aims to maximize … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(12 citation statements)
references
References 19 publications
0
10
0
Order By: Relevance
“…We perform our DL-based evaluation based on the Correlation Optimization (CO) scheme introduced by Robyns et al [RQL18] at CHES 2019. It is shortly introduced in the following before we present two extensions to the original CO scheme.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…We perform our DL-based evaluation based on the Correlation Optimization (CO) scheme introduced by Robyns et al [RQL18] at CHES 2019. It is shortly introduced in the following before we present two extensions to the original CO scheme.…”
Section: Methodsmentioning
confidence: 99%
“…Next, we present an attack procedure that allows to extract the 256-bit key involving the first five AES rounds. Finally, we demonstrate the application of our attack procedure using an enhanced version of the DL-based correlation optimization scheme introduced at CHES 2019 [RQL18]. Although we are not able to recover all bytes of the AES-256 key in our experiments, we can provide concrete numbers about the remaining attack complexity.…”
Section: Contributionmentioning
confidence: 98%
“…We propose an architecture that encodes measurements using shared layers to reduce the dimensions of the measurements before transferring them to each base architecture. A similar approach to this concept, which encodes side-channel measurements using deep learning was proposed by Robyns [25]. Also, in [26], they also separated a neural network for Points of Interest (PoI) detection and plaintext feature embedding.…”
Section: Improved Differential Deep Learning Analysis With Shared Layersmentioning
confidence: 99%
“…Since Kocher proposed the timing analysis method [ 1 ] in 1996, side-channel analysis, a unique cryptanalysis method distinct from classical cryptanalysis, has become a research hotspot in the field of cryptography, after more than 20 years of development with its powerful analysis ability and wide application range. General classes of side-channel analysis include timing analysis, power analysis [ 2 , 3 , 4 , 5 , 6 , 7 ], template analysis [ 8 , 9 , 10 , 11 , 12 , 13 , 14 ], electromagnetic analysis [ 14 , 15 , 16 ], collision attack [ 17 , 18 ], fault analysis [ 19 , 20 , 21 ], and artificial intelligence side-channel analysis [ 22 , 23 , 24 ].…”
Section: Introductionmentioning
confidence: 99%