Side-channel attacks and machine learning approach

Most modern devices and cryptoalgorithms are vulnerable to a new class of attack called side-channel attack. It analyses physical parameters of the system in order to get secret key. Most spread techniques are simple and differential power attacks with combination of statistical tools. Few studies c...

Full description

Bibliographic Details
Main Authors: Alia Levina, Daria Sleptsova, Oleg Zaitsev
Format: Article
Language:English
Published: FRUCT 2016-04-01
Series:Proceedings of the XXth Conference of Open Innovations Association FRUCT
Subjects:
Online Access:https://fruct.org/publications/fruct18/files/Lev.pdf
_version_ 1819163853335822336
author Alia Levina
Daria Sleptsova
Oleg Zaitsev
author_facet Alia Levina
Daria Sleptsova
Oleg Zaitsev
author_sort Alia Levina
collection DOAJ
description Most modern devices and cryptoalgorithms are vulnerable to a new class of attack called side-channel attack. It analyses physical parameters of the system in order to get secret key. Most spread techniques are simple and differential power attacks with combination of statistical tools. Few studies cover using machine learning methods for pre-processing and key classification tasks. In this paper, we investigate applicability of machine learning methods and their characteristic. Following theoretical results, we examine power traces of AES encryption with Support Vector Machines algorithm and decision trees and provide roadmap for further research.
first_indexed 2024-12-22T17:50:44Z
format Article
id doaj.art-67eb2c825f574cfa9ce49d253b75ff30
institution Directory Open Access Journal
issn 2305-7254
2343-0737
language English
last_indexed 2024-12-22T17:50:44Z
publishDate 2016-04-01
publisher FRUCT
record_format Article
series Proceedings of the XXth Conference of Open Innovations Association FRUCT
spelling doaj.art-67eb2c825f574cfa9ce49d253b75ff302022-12-21T18:18:10ZengFRUCTProceedings of the XXth Conference of Open Innovations Association FRUCT2305-72542343-07372016-04-016641818118610.1109/FRUCT-ISPIT.2016.7561525Side-channel attacks and machine learning approachAlia Levina0Daria Sleptsova1Oleg Zaitsev2ITMO University, Saint Petersburg, RussiaITMO University, Saint Petersburg, RussiaITMO University, Saint Petersburg, RussiaMost modern devices and cryptoalgorithms are vulnerable to a new class of attack called side-channel attack. It analyses physical parameters of the system in order to get secret key. Most spread techniques are simple and differential power attacks with combination of statistical tools. Few studies cover using machine learning methods for pre-processing and key classification tasks. In this paper, we investigate applicability of machine learning methods and their characteristic. Following theoretical results, we examine power traces of AES encryption with Support Vector Machines algorithm and decision trees and provide roadmap for further research.https://fruct.org/publications/fruct18/files/Lev.pdf Side-channel attacksAESMachine learning
spellingShingle Alia Levina
Daria Sleptsova
Oleg Zaitsev
Side-channel attacks and machine learning approach
Proceedings of the XXth Conference of Open Innovations Association FRUCT
Side-channel attacks
AES
Machine learning
title Side-channel attacks and machine learning approach
title_full Side-channel attacks and machine learning approach
title_fullStr Side-channel attacks and machine learning approach
title_full_unstemmed Side-channel attacks and machine learning approach
title_short Side-channel attacks and machine learning approach
title_sort side channel attacks and machine learning approach
topic Side-channel attacks
AES
Machine learning
url https://fruct.org/publications/fruct18/files/Lev.pdf
work_keys_str_mv AT alialevina sidechannelattacksandmachinelearningapproach
AT dariasleptsova sidechannelattacksandmachinelearningapproach
AT olegzaitsev sidechannelattacksandmachinelearningapproach