TY - JOUR
T1 - A novel bit scalable leakage model based on genetic algorithm
AU - Zhang, Zhenbin
AU - Wu, Liji
AU - Wang, An
AU - Mu, Zhaoli
AU - Zhang, Xiangmin
N1 - Publisher Copyright:
© 2015 John Wiley & Sons, Ltd.
PY - 2015/12/1
Y1 - 2015/12/1
N2 - With the growing popularity of smart integrated circuit (IC) cards, the chip security is attracting more and more attention. Researches on the attack and protection of smart IC cards have become increasingly hot. Side-channel attack is the practical and effective method, which has brought enormous threat. The efficiency of attack depends on the extent of the leakage model, which characterizes the practical applications. In the power analysis attack, the classical leakage model usually exploits the power consumption of single S-box, which is called divide and conquer. Taking data encryption standard (DES) algorithm, for example, the attack on each S-box needs to search the key space of 26 in a brute-force way. In this paper, we propose a novel leakage model, which is more flexible than the classical leakage model. The novel leakage model is based on the power consumption of multiple S-boxes, and the implementation of this method is combined with genetic algorithm. We can establish leakage model based on the Hamming distance of round output generated by eight S-boxes in DES algorithm. The experiment verifies the fact that the leakage model of eight S-boxes can decrease the traces number up to 52% than the classical one based on single S-box for DES algorithm. It also decreases the traces number up to 32% for SM4 algorithm. All the measurements of power data are acquired from a practical smart IC card. We also conclude that increasing noise, using variable clock, and limiting the lifetime of root key can be the choices of defensive strategy.
AB - With the growing popularity of smart integrated circuit (IC) cards, the chip security is attracting more and more attention. Researches on the attack and protection of smart IC cards have become increasingly hot. Side-channel attack is the practical and effective method, which has brought enormous threat. The efficiency of attack depends on the extent of the leakage model, which characterizes the practical applications. In the power analysis attack, the classical leakage model usually exploits the power consumption of single S-box, which is called divide and conquer. Taking data encryption standard (DES) algorithm, for example, the attack on each S-box needs to search the key space of 26 in a brute-force way. In this paper, we propose a novel leakage model, which is more flexible than the classical leakage model. The novel leakage model is based on the power consumption of multiple S-boxes, and the implementation of this method is combined with genetic algorithm. We can establish leakage model based on the Hamming distance of round output generated by eight S-boxes in DES algorithm. The experiment verifies the fact that the leakage model of eight S-boxes can decrease the traces number up to 52% than the classical one based on single S-box for DES algorithm. It also decreases the traces number up to 32% for SM4 algorithm. All the measurements of power data are acquired from a practical smart IC card. We also conclude that increasing noise, using variable clock, and limiting the lifetime of root key can be the choices of defensive strategy.
KW - Bit scalable leakage model
KW - Correlation power analysis
KW - DES and SM4 algorithms
KW - Genetic algorithm
UR - http://www.scopus.com/inward/record.url?scp=84940204152&partnerID=8YFLogxK
U2 - 10.1002/sec.1308
DO - 10.1002/sec.1308
M3 - Article
AN - SCOPUS:84940204152
SN - 1939-0114
VL - 8
SP - 3896
EP - 3905
JO - Security and Communication Networks
JF - Security and Communication Networks
IS - 18
ER -