Two Dimensional SOST: Extract Multi-Dimensional Leakage for Side-Channel Analysis on Cryptosystems

Zheng Liu, Congming Wei*, Shengjun Wen, Shaofei Sun, Yaoling Ding, An Wang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

In 2021, Perin et al. proposed a horizontal attack framework against elliptic curve scalar multiplication (ECSM) operation based on the work of Nascimento et al. Their framework consists roughly of three steps. First, they apply k-means on the iteration traces from multiple ECSM executions, then, the results of clustering are used to make a leakage metric trace by using sum-of-squared t-values (SOST), based on the leakage metric trace, the points of interest (POI) are selected. Second, they apply k-means on those POIs to get initial labels for the scalar bits, the accuracy of initial labels is only 52%. Third, wrong bits are corrected by using an iterative deep learning framework. Our work focus on improving the horizontal attack framework by replacing SOST with our proposed two dimensional SOST (2D-SOST) to improve the efficiency of POI selection under unsupervised context. 2D-SOST can extract leakage information between dimensions while SOST can only extract information on one dimension which limits its performance. By replacing SOST with 2D-SOST, our method improves the accuracy of clustering algorithm from an average of 58% to an average of 74%. We also simplified the framework used in original paper and finally recover scalar bits successfully under the configuration where the original paper can not.

Original languageEnglish
Title of host publicationProceedings - 2023 7th International Conference on Cryptography, Security and Privacy, CSP 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-6
Number of pages6
ISBN (Electronic)9798350323368
DOIs
Publication statusPublished - 2023
Event7th International Conference on Cryptography, Security and Privacy, CSP 2023 - Tianjin, China
Duration: 21 Apr 202323 Apr 2023

Publication series

NameProceedings - 2023 7th International Conference on Cryptography, Security and Privacy, CSP 2023

Conference

Conference7th International Conference on Cryptography, Security and Privacy, CSP 2023
Country/TerritoryChina
CityTianjin
Period21/04/2323/04/23

Keywords

  • SOST
  • horizontal attacks
  • leakage detection
  • side-channel analysis

Fingerprint

Dive into the research topics of 'Two Dimensional SOST: Extract Multi-Dimensional Leakage for Side-Channel Analysis on Cryptosystems'. Together they form a unique fingerprint.

Cite this