On features suitable for power analysis - filtering the contributing features for symmetric key recovery

Naila Mukhtar, Yinan Kong

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

4 Citations (Scopus)

Abstract

Side-channel attacks have left the traditional methods of cryptanalysis far behind. The algorithms are mathematically secure, but the side-channel leakage poses a serious security threat. Innovative machine-learning classification methods have remarkably reduced the sampling time as well as the time required to recover the key. However, these results are constrained by high dimensionality, i.e. complex feature data increases the classification time, and at times results in false classification. In this paper, we a im to narrow down the feature space and determine which features contribute most, towards better classification accuracy, for key retrieval from an AES implementation running over Kintex-7. We have provided a comparison of classifying the key bit as 0 or 1 with a varying number of samples and different sets of features. This paper gives practical results of different properties becoming features for extracted power signals using both feature selection and extraction methods.

Original languageEnglish
Title of host publication6th International Symposium on Digital Forensic and Security
Subtitle of host publicationproceeding
EditorsAsaf Varol, Murat Karabatak, Cihan Varol
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages265-270
Number of pages6
ISBN (Electronic)9781538634493
ISBN (Print)9781538634509
DOIs
Publication statusPublished - 2018
Event6th International Symposium on Digital Forensic and Security, ISDFS 2018 - Antalya, Turkey
Duration: 22 Mar 201825 Mar 2018

Conference

Conference6th International Symposium on Digital Forensic and Security, ISDFS 2018
Country/TerritoryTurkey
CityAntalya
Period22/03/1825/03/18

Fingerprint

Dive into the research topics of 'On features suitable for power analysis - filtering the contributing features for symmetric key recovery'. Together they form a unique fingerprint.

Cite this