Back to Search
Start Over
On features suitable for power analysis — Filtering the contributing features for symmetric key recovery
- Source :
- 2018 6th International Symposium on Digital Forensic and Security (ISDFS).
- Publication Year :
- 2018
- Publisher :
- IEEE, 2018.
-
Abstract
- Side-channel attacks have left the traditional methods of cryptanalysis far behind. The algorithms are mathematically secure, but the side-channel leakage poses a serious security threat. Innovative machine-learning classification methods have remarkably reduced the sampling time as well as the time required to recover the key. However, these results are constrained by high dimensionality, i.e. complex feature data increases the classification time, and at times results in false classification. In this paper, we a im to narrow down the feature space and determine which features contribute most, towards better classification accuracy, for key retrieval from an AES implementation running over Kintex-7. We have provided a comparison of classifying the key bit as 0 or 1 with a varying number of samples and different sets of features. This paper gives practical results of different properties becoming features for extracted power signals using both feature selection and extraction methods.
Details
- Database :
- OpenAIRE
- Journal :
- 2018 6th International Symposium on Digital Forensic and Security (ISDFS)
- Accession number :
- edsair.doi...........fe4e1d7d92d303baa25d6809aea34831
- Full Text :
- https://doi.org/10.1109/isdfs.2018.8355363