【24h】

Learning to attack from electromagnetic emanation

机译:学会从电磁辐射中发起攻击

获取原文
获取原文并翻译 | 示例

摘要

Sensitive information processed by the circuitry in electronic security devices can be leaked via physical characteristics of the device, such as power consumption, electromagnetic (EM) emanation, timing, etc. These techniques are known as Side-Channel Attacks (SCA). To date, a significant amount of research has been carried out into side channel attacks, which uses statistical processing techniques to analyse the information leaked from the device. This work formalized the problem of studying the relation between EM emanation and encryption key as a supervised learning task. The considered technique is Support Vector Machine (SVM). The chosen side channel is the EM emanation and the target is a software implementation of the Data Encryption Standard (DES). In this study, several feature selection techniques are compared in a real experimental setting. Our promising results regarding the DES encryption scheme confirms the importance of adopting SVM in cryptanalysis and the effectiveness of our approach in feature selection.
机译:电子安全设备中的电路处理的敏感信息可能会通过设备的物理特性(例如功耗,电磁(EM)辐射,定时等)泄漏出去。这些技术被称为“边信道攻击(SCA)”。迄今为止,已经对侧通道攻击进行了大量研究,该攻击使用统计处理技术来分析从设备泄漏的信息。这项工作将研究EM发放与加密密钥之间的关系作为监督学习任务正式化。所考虑的技术是支持向量机(SVM)。选择的辅助通道是EM发出,目标是数据加密标准(DES)的软件实现。在这项研究中,在实际实验环境中比较了几种特征选择技术。关于DES加密方案的令人鼓舞的结果证实了在密码分析中采用SVM的重要性以及我们的方法在特征选择中的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号