Please use this identifier to cite or link to this item:
Title: Feature selection methods for non-profiled side-channel attacks on ECC
Authors: Bhasin, Shivam
Ravi, Prasanna
Jungk, Bernhard
Jap, Dirmanto
Najm, Zakaria
Keywords: Cryptography
Side-Channel Attacks
Engineering::Electrical and electronic engineering
Issue Date: 2018
Source: Ravi, P., Jungk, B., Jap, D., Najm, Z., & Bhasin, S. (2018). Feature selection methods for non-profiled side-channel attacks on ECC. 2018 IEEE 23rd International Conference on Digital Signal Processing (DSP). doi:10.1109/ICDSP.2018.8631824
Abstract: Elliptic curve cryptography (ECC) is a public key cryptosystem which is widely used for different real world applications. With the introduction of side-channel attacks, there is a growing concern regarding the security of such implementations. Indeed, side-channel attacks have been reported to break even the theoretically secure ciphers due to the exploit in the physical leakage. The non-profiled side-channel attacks, especially are considered more serious than the profiled counterpart, as the former can work in almost black box setting. Several attacks have been proposed, however, one of the main issue normally encountered is regarding the selection of relevant features from the side-channel signal. For ECC implementation, normally the side-channel measurements will contain lots of irrelevant points which could hinder the effectiveness of the attack. For profiling scenario, these features can be determined, since the attacker has full knowledge, however, for black box non-profiled setting, this might pose an issue. In this work, we investigate different feature selection approaches to improve the accuracy for non-profiled attacks on ECC.
DOI: 10.1109/ICDSP.2018.8631824
Rights: © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at:
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:TL Conference Papers

Files in This Item:
File Description SizeFormat 
On_Data_Mining_Approach_for_Non_Profiled_Side_Channel_Attacks_for_ECC_Implementations.pdf208.22 kBAdobe PDFThumbnail

Page view(s)

Updated on Sep 18, 2021

Download(s) 50

Updated on Sep 18, 2021

Google ScholarTM




Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.