PDF(3996 KB)
Side Channel Attack Based on Time Series Analysis
Jianbo ZHAO, Min WANG, Wei XI, Zhen WU, Zhibo DU, Yi WANG, Tian LAN
South Power Sys Technol ›› 2020, Vol. 14 ›› Issue (1) : 10-17.
PDF(3996 KB)
PDF(3996 KB)
Side Channel Attack Based on Time Series Analysis
The cryptographic device generates a large amount of physical information such as electromagnetic,energy consumption,heat,etc. during encryption and decryption. The attackers use these physical information to perform a side channel attack on the cryptographic device and steal the key of the cryptographic device. In the case of a traditional simple power analysis attack of elliptic curve cryptography algorithm,the attacker recovers the key by manually identifying similar modules in the power consumption data of the double point calculation. But this way results in low attack efficiency and low attack accuracy. This paper proposes the SPAMD algorithm based on the time series of motif discovery. The algorithm realizes the automatic recognition of similar modules in the power consumption data of the double point calculation,and completes the conversion of the attack mode from manual recognition to automatic recognition. Experiment results show that SPAMD attacks have a significant improvement in efficiency and accuracy.
side channel attack / simple power analysis attack / double point calculation / motif discovery
| [1] |
|
| [2] |
|
| [3] |
|
| [4] |
|
| [5] |
|
| [6] |
|
| [7] |
|
| [8] |
|
| [9] |
|
| [10] |
|
| [11] |
|
| [12] |
|
| [13] |
|
| [14] |
|
| [15] |
|
| [16] |
|
| [17] |
|
| [18] |
|
| [19] |
|
/
| 〈 |
|
〉 |