A side-channel attack on a masked and shuffled software implementation of Saber
CC BY
Lưu vào:
| Tác giả chính: | , , |
|---|---|
| Định dạng: | Sách |
| Ngôn ngữ: | English |
| Nhà xuất bản: |
Springer
2023
|
| Chủ đề: | |
| Truy cập trực tuyến: | https://link.springer.com/article/10.1007/s13389-023-00315-3 https://dlib.phenikaa-uni.edu.vn/handle/PNK/8349 |
| Từ khóa: |
Thêm từ khóa
Không có từ khóa, Hãy là người đầu tiên đánh dấu biểu ghi này!
|
| id |
oai:localhost:PNK-8349 |
|---|---|
| record_format |
dspace |
| spelling |
oai:localhost:PNK-83492023-04-27T04:46:04Z A side-channel attack on a masked and shuffled software implementation of Saber Kalle, Ngo Elena, Dubrova Thomas, Johansson software implementation of Saber CC BY In this paper, we show that a software implementation of IND-CCA-secure Saber key encapsulation mechanism protected by first-order masking and shuffling can be broken by deep learning-based power analysis. Using an ensemble of deep neural networks trained at the profiling stage, we can recover the session key and the secret key from 257×N and 24×257×N traces, respectively, where N is the number of repetitions of the same easurement. The value of N depends on the implementation of the algorithm, the type of device under attack, environmental factors, acquisition noise, etc.; in our experiments N=10 is sufficient for a successful attack. The neural networks are trained on a combination of 80% of traces from the profiling device with a known shuffling order and 20% of traces from the device under attack captured for all-0 and all-1 messages. “Spicing” the training set with traces from the device under attack helps us minimize the negative effect of inter-device variability. 2023-04-27T04:46:04Z 2023-04-27T04:46:04Z 2023 Book https://link.springer.com/article/10.1007/s13389-023-00315-3 https://dlib.phenikaa-uni.edu.vn/handle/PNK/8349 en application/pdf Springer |
| institution |
Digital Phenikaa |
| collection |
Digital Phenikaa |
| language |
English |
| topic |
software implementation of Saber |
| spellingShingle |
software implementation of Saber Kalle, Ngo Elena, Dubrova Thomas, Johansson A side-channel attack on a masked and shuffled software implementation of Saber |
| description |
CC BY |
| format |
Book |
| author |
Kalle, Ngo Elena, Dubrova Thomas, Johansson |
| author_facet |
Kalle, Ngo Elena, Dubrova Thomas, Johansson |
| author_sort |
Kalle, Ngo |
| title |
A side-channel attack on a masked and shuffled software implementation of Saber |
| title_short |
A side-channel attack on a masked and shuffled software implementation of Saber |
| title_full |
A side-channel attack on a masked and shuffled software implementation of Saber |
| title_fullStr |
A side-channel attack on a masked and shuffled software implementation of Saber |
| title_full_unstemmed |
A side-channel attack on a masked and shuffled software implementation of Saber |
| title_sort |
side-channel attack on a masked and shuffled software implementation of saber |
| publisher |
Springer |
| publishDate |
2023 |
| url |
https://link.springer.com/article/10.1007/s13389-023-00315-3 https://dlib.phenikaa-uni.edu.vn/handle/PNK/8349 |
| _version_ |
1764358630636781568 |
| score |
8.893527 |
