side channel attack
Recently Published Documents


TOTAL DOCUMENTS

356
(FIVE YEARS 151)

H-INDEX

19
(FIVE YEARS 5)

Author(s):  
Zixin Liu ◽  
Zhibo Wang ◽  
Mingxing Ling

Side-channel attack (SCA) based on machine learning has proved to be a valid technique in cybersecurity, especially subjecting to the symmetric-key crypto implementations in serial operation. At the same time, parallel-encryption computing based on Field Programmable Gate Arrays (FPGAs) grows into a new influencer, but the attack results using machine learning are exiguous. Research on the traditional SCA has been mostly restricted to pre-processing: Signal Noisy Ratio (SNR) and Principal Component Analysis (PCA), etc. In this work, firstly, we propose to replace Points of Interests (POIs) and dimensionality reduction by utilizing word embedding, which converts power traces into sensitive vectors. Secondly, we combined sensitive vectors with Long Short Term Memories (LSTM) to execute SCA based on FPGA crypto-implementations. In addition, compared with traditional Template Attack (TA), Multiple Multilayer Perceptron (MLP) and Convolutional Neural Network (CNN). The result shows that the proposed model can not only reduce the manual operation, such as parametric assumptions and dimensionality setting, which limits their range of application, but improve the effectiveness of side-channel attacks as well.


Entropy ◽  
2021 ◽  
Vol 23 (11) ◽  
pp. 1538
Author(s):  
Andrei Tănăsescu ◽  
Marios O. Choudary ◽  
Olivier Rioul ◽  
Pantelimon George Popescu

The bounds presented at CHES 2017 based on Massey’s guessing entropy represent the most scalable side-channel security evaluation method to date. In this paper, we present an improvement of this method, by determining the asymptotically optimal Massey-like inequality and then further refining it for finite support distributions. The impact of these results is highlighted for side-channel attack evaluations, demonstrating the improvements over the CHES 2017 bounds.


2021 ◽  
Author(s):  
Masaki Nakanose ◽  
Yuta Kodera ◽  
Takuya Kusaka ◽  
Yasuyuki Nogami

2021 ◽  
Author(s):  
Harunobu Enami ◽  
Yuta Kodera ◽  
Takuya Kusaka ◽  
Yasuyuki Nogami

2021 ◽  
Author(s):  
Bhargav Achary Dandpati Kumar ◽  
Sai Chandra Teja R ◽  
Sparsh Mittal ◽  
Biswabandan Panda ◽  
C. Krishna Mohan

2021 ◽  
Vol 11 (20) ◽  
pp. 9560
Author(s):  
Yi-Fei Lu ◽  
Mu-Sheng Jiang ◽  
Yang Wang ◽  
Xiao-Xu Zhang ◽  
Fan Liu ◽  
...  

The twin-field quantum key distribution (TF-QKD) and its variants can overcome the fundamental rate-distance limit of QKD. However, their physical implementations with the side channels remain the subject of further research. We test the side channel of a type of external intensity modulation that applies a Mach–Zehnder-type electro-optical intensity modulator, which shows the distinguishability of the signal and decoy states in the frequency domain. Based on this security loophole, we propose a side-channel attack, named the passive frequency-shift attack, on the imperfect implementation of the sending or not-sending (SNS) TF-QKD protocol. We analyze the performance of the SNS protocol with the actively odd-parity pairing (AOPP) method under the side-channel attack by giving the formula of the upper bound of the real secret key rate and comparing it with the lower bound of the secret key rate under Alice and Bob’s estimation. The simulation results quantitatively show the effectiveness of the attack on the imperfect devices at a long distance. Our results emphasize the importance of practical security at the light source and might provide a valuable reference for device selection in the practical implementation of the SNS protocol.


2021 ◽  
Author(s):  
Zhaohui Chen ◽  
Emre Karabulut ◽  
Aydin Aysu ◽  
Yuan Ma ◽  
Jiwu Jing

Sign in / Sign up

Export Citation Format

Share Document