Clustering versus Statistical Analysis for SCA: when Machine Learning is Better

01/05/2022
by   Marcin Aftowicz, et al.
0

Evaluation of the resistance of implemented cryptographic algorithms against SCA attacks, as well as detecting of SCA leakage sources at an early stage of the design process, is important for an efficient re-design of the implementation. Thus, effective SCA methods that do not depend on the key processed in the cryptographic operations are beneficially and can be a part of the efficient design methodology for implementing cryptographic approaches. In this work we compare two different methods that are used to analyse power traces of elliptic curve point multiplications. The first method the comparison to the mean is a simple method based on statistical analysis. The second one is K-means - the mostly used unsupervised machine learning algorithm for data clustering. The results of our early work showed that the machine learning algorithm was not superior to the simple approach. In this work we concentrate on the comparison of the attack results using both analysis methods with the goal to understand their benefits and drawbacks. Our results show that the comparison to the mean works properly only if the scalar processed during the attacked kP execution is balanced, i.e. if the number of '1' in the scalar k is about as high as the number of '0'. In contrast to this, K-means is effective also if the scalar is highly unbalanced. It is still effective even if the scalar k contains only a very small number of '0' bits.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/04/2022

Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves

In this paper we report on the results of selected horizontal SCA attack...
research
07/10/2020

Microarchitecture Online Template Attacks

Online template attack (OTA) is a powerful technique previously used to ...
research
06/23/2021

EC Scalar Multiplication: Successful Simple Address Bit SCA Attack against Atomic Patterns

In this work we discuss the resistance of atomic pattern algorithms for ...
research
01/05/2022

Horizontal SCA Attacks against kP Algorithm Using K-Means and PCA

Side Channel Analysis attacks take advantage of the information leaked f...
research
01/06/2022

Flexible FPGA ECDSA Design with a Field Multiplier Inherently Resistant against HCCA

In this paper we describe our flexible ECDSA design for elliptic curve o...
research
01/07/2022

Methods for Increasing the Resistance of Cryptographic Designs against Horizontal DPA Attacks

Side-channel analysis attacks, especially horizontal DPA and DEMA attack...
research
09/21/2017

In-depth comparison of the Berlekamp -- Massey -- Sakata and the Scalar-FGLM algorithms: the non adaptive variants

We compare thoroughly the Berlekamp -- Massey -- Sakata algorithm and th...

Please sign up or login with your details

Forgot password? Click here to reset