Back to Search Start Over

On features suitable for power analysis — Filtering the contributing features for symmetric key recovery

Authors :
Yinan Kong
Naila Mukhtar
Source :
2018 6th International Symposium on Digital Forensic and Security (ISDFS).
Publication Year :
2018
Publisher :
IEEE, 2018.

Abstract

Side-channel attacks have left the traditional methods of cryptanalysis far behind. The algorithms are mathematically secure, but the side-channel leakage poses a serious security threat. Innovative machine-learning classification methods have remarkably reduced the sampling time as well as the time required to recover the key. However, these results are constrained by high dimensionality, i.e. complex feature data increases the classification time, and at times results in false classification. In this paper, we a im to narrow down the feature space and determine which features contribute most, towards better classification accuracy, for key retrieval from an AES implementation running over Kintex-7. We have provided a comparison of classifying the key bit as 0 or 1 with a varying number of samples and different sets of features. This paper gives practical results of different properties becoming features for extracted power signals using both feature selection and extraction methods.

Details

Database :
OpenAIRE
Journal :
2018 6th International Symposium on Digital Forensic and Security (ISDFS)
Accession number :
edsair.doi...........fe4e1d7d92d303baa25d6809aea34831
Full Text :
https://doi.org/10.1109/isdfs.2018.8355363