当前位置: X-MOL 学术Comput. Electr. Eng. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
The use of ellipse-based estimator as a sub-key distinguisher for Side-Channel Analysis
Computers & Electrical Engineering ( IF 4.3 ) Pub Date : 2021-07-22 , DOI: 10.1016/j.compeleceng.2021.107311
Alberto F. Martínez-Herrera 1 , Carlos Mex-Perera 2 , Cuauhtemoc Mancillas-López 3 , Carolina Del-Valle-Soto 4 , Lilian Bossuet 5
Affiliation  

Side-Channel Analysis has become a relevant tool to analyze a cryptographic device. Here, an adversary looks for information leakage from emanation sources such as power consumption, thus obtaining sensitive information with a lower effort than the mathematical approach. In this manuscript, a distinguisher based on the Mahalanobis distance is applied. Instead of computing an inverse covariance matrix because of lack-sampling problems with tested datasets, a shrinkage calculation is implemented, thus obtaining efficient Mahalanobis distance implementations. The current approach is evaluated using different standardized tests such as stability and success probability, which are computed using unmasked public traces obtained from the Advanced Encryption Standard’s typical implementations with a 128-bit key. We show that this technique’s efficiency is better than Pearson correlation using few traces in terms of probability detection.



中文翻译:

使用基于椭圆的估计器作为侧信道分析的子密钥区分器

旁道分析已成为分析加密设备的相关工具。在这里,攻击者会从功耗等辐射源中寻找信息泄漏,从而以比数学方法更低的工作量获得敏感信息。在这份手稿中,应用了基于马哈拉诺比斯距离的区分器。由于测试数据集缺乏采样问题,而不是计算逆协方差矩阵,而是实现了收缩计算,从而获得了有效的马氏距离实现。当前的方法使用不同的标准化测试进行评估,例如稳定性和成功概率,这些测试是使用从高级加密标准的典型实现中获得的无掩码公共痕迹计算的,使用 128 位密钥。

更新日期:2021-07-23
down
wechat
bug