Design and implementation of a physical security evaluation system for cryptographic chips based on machine learning

Jiajing Liu, Congming Wei*, Shengjun Wen, An Wang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Side-channel attack is a commonly used attack method for recovering cryptographic chip keys, and plays an important role in the field of cryptographic chip physical security evaluation. Combining side-channel attacks with machine learning and replacing some steps of traditional side-channel attacks with machine learning methods can improve the efficiency of key-recovery from side-channel attacks to a certain extent. In practice, there is a problem that most existing cryptographic chip security evaluation systems cannot support the complete key recovery process, and fully improve the utilization of side information generated in the evaluation process. In this paper, we design a cryptographic chip physical security evaluation system based on machine learning. Through the integrated operation of power trace acquisition, preprocessing, analysis and evaluation, the correct key can be successfully recovered.

Original languageEnglish
Title of host publicationThird International Conference on Intelligent Computing and Human-Computer Interaction, ICHCI 2022
EditorsKannimuthu Subramanian
PublisherSPIE
ISBN (Electronic)9781510661301
DOIs
Publication statusPublished - 2023
Event3rd International Conference on Intelligent Computing and Human-Computer Interaction, ICHCI 2022 - Guangzhou, China
Duration: 12 Aug 202214 Aug 2022

Publication series

NameProceedings of SPIE - The International Society for Optical Engineering
Volume12509
ISSN (Print)0277-786X
ISSN (Electronic)1996-756X

Conference

Conference3rd International Conference on Intelligent Computing and Human-Computer Interaction, ICHCI 2022
Country/TerritoryChina
CityGuangzhou
Period12/08/2214/08/22

Keywords

  • Side-channel attack
  • cryptographic chip
  • machine learning
  • security evaluation

Fingerprint

Dive into the research topics of 'Design and implementation of a physical security evaluation system for cryptographic chips based on machine learning'. Together they form a unique fingerprint.

Cite this