TY - JOUR
T1 - More Practical and Robust
T2 - Enhancing Simple Power Analysis on Cryptosystems with Double Clustering
AU - Li, Zhen
AU - Liu, Annyu
AU - Wang, Weijia
AU - Wang, An
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2025
Y1 - 2025
N2 - The widespread use of public key cryptographic algorithms in embedded devices has made them a primary target for side-channel analysis. Clustering-based Simple Power Analysis (SPA) poses a significant threat to public key implementations by inferring secret keys through the identification of distinguishable patterns in side-channel information. However, traditional clustering-based SPA methods are highly sensitive—even to non-key-dependent patterns—thereby limiting their robustness and practical applicability. To address these limitations, this paper proposes a double clustering method that enhances the flexibility, accuracy, and robustness of clustering-based SPA. By progressively adjusting the the number of clusters, the method adaptively identifies optimal clustering configurations, mitigating the need for fixed assumptions and improving resistance to noise and other interfering factors. Experiments covering multiple cryptographic algorithms, hardware platforms, and countermeasure settings demonstrate that the proposed method consistently outperforms traditional clustering-based SPA methods.
AB - The widespread use of public key cryptographic algorithms in embedded devices has made them a primary target for side-channel analysis. Clustering-based Simple Power Analysis (SPA) poses a significant threat to public key implementations by inferring secret keys through the identification of distinguishable patterns in side-channel information. However, traditional clustering-based SPA methods are highly sensitive—even to non-key-dependent patterns—thereby limiting their robustness and practical applicability. To address these limitations, this paper proposes a double clustering method that enhances the flexibility, accuracy, and robustness of clustering-based SPA. By progressively adjusting the the number of clusters, the method adaptively identifies optimal clustering configurations, mitigating the need for fixed assumptions and improving resistance to noise and other interfering factors. Experiments covering multiple cryptographic algorithms, hardware platforms, and countermeasure settings demonstrate that the proposed method consistently outperforms traditional clustering-based SPA methods.
KW - Side-channel analysis
KW - clustering analysis
KW - double clustering
KW - simple power analysis
UR - https://www.scopus.com/pages/publications/105025696105
U2 - 10.1109/JIOT.2025.3645921
DO - 10.1109/JIOT.2025.3645921
M3 - Article
AN - SCOPUS:105025696105
SN - 2327-4662
JO - IEEE Internet of Things Journal
JF - IEEE Internet of Things Journal
ER -