optimization of power analysis using neural network
play

Optimization of Power Analysis Using Neural Network Zdenek - PowerPoint PPT Presentation

About Us Introduction Optimization of Power Analysis Conclusion Optimization of Power Analysis Using Neural Network Zdenek Martinasek, Jan Hajny and Lukas Malina Dpt. of Telecommunications, Brno University of Technology Brno, Czech Republic


  1. About Us Introduction Optimization of Power Analysis Conclusion Optimization of Power Analysis Using Neural Network Zdenek Martinasek, Jan Hajny and Lukas Malina Dpt. of Telecommunications, Brno University of Technology Brno, Czech Republic martinasek@feec.vutbr.cz crypto.utko.feec.vutbr.cz Zdenek Martinasek, Jan Hajny and Lukas Malina Optimization of Power Analysis Using Neural Network

  2. About Us Introduction Optimization of Power Analysis Conclusion Outline About Us 1 Introduction 2 Motivation Our Contribution Optimization of Power Analysis 3 Optimization Proposal Implementation of Optimization Comparison of Classification Results Conclusion 4 Zdenek Martinasek, Jan Hajny and Lukas Malina Optimization of Power Analysis Using Neural Network

  3. About Us Introduction Cryptology Research Group at BUT Optimization of Power Analysis Conclusion Crypto Research Group, Brno University of Technology, CZ Small group of cca 10 people, part of Department of Telecommunications, FEEC BUT in Brno, Czech Republic, equipped by SIX Research Centre, both basic and applied research, http://crypto.utko.feec.vutbr.cz/. Zdenek Martinasek, Jan Hajny and Lukas Malina Optimization of Power Analysis Using Neural Network

  4. About Us Introduction Cryptology Research Group at BUT Optimization of Power Analysis Conclusion R&D in Cryptology and Computer Security Basic research: provable cryptographic protocol design, light-weight cryptography, side channel cryptanalysis. Implementation: smart-cards (Java, .NET, MultOS), mobile OS (iOS, Android), sensors, micro-controllers. Zdenek Martinasek, Jan Hajny and Lukas Malina Optimization of Power Analysis Using Neural Network

  5. About Us Introduction Motivation Optimization of Power Analysis Our Contribution Conclusion Main Characteristics of the Original Implementation PA based on two-layer perceptron network 1 (preparation of power patterns, training of the neural network, classification), the first experiment showed a success rate of 90% for the first byte of AES secret key ( AddRoundKey and SubByte ), theoretical and empirical success rates were determined only to 80% and 85% , respectively, these results were not sufficient enough , other negative characteristics were revealed during the testing, optimization of the method above was realized to increase the success rate of classification . 1MARTIN´ ASEK, Z.; ZEMAN, V. Innovative Method of the Power Analysis. Radioengineering, 2013, vol. 22, no. 02, p. 586-594. ISSN: 1210- 2512. Zdenek Martinasek, Jan Hajny and Lukas Malina Optimization of Power Analysis Using Neural Network

  6. About Us Introduction Motivation Optimization of Power Analysis Our Contribution Conclusion Our Contribution Proposal of the optimization of the original power analysis method using the neural network, implementation of the proposed optimization, comparison the results of the optimized method with the original implementation, highlighting the positive and negative characteristic, verification of original method with standard 10-fold cross-validation, comparison of the results of both implementations using cross-validation.. Zdenek Martinasek, Jan Hajny and Lukas Malina Optimization of Power Analysis Using Neural Network

  7. About Us Optimization Proposal Introduction Implementation of Optimization Optimization of Power Analysis Comparison of Classification Results Conclusion Optimization Proposal - Preparation of Power Patterns The optimization using calculation of the average trace and the subsequent calculation of the difference power traces, denote P [ i , n ] as power traces corresponding to every secret key value, where n = { 0 , . . . , s } is discrete time, and i represents all possible secret key byte values from 0 to 255, an average trace ¯ A can be calculate as: 255 1 ¯ � A [ n ] = P [ i , n ] . (1) 256 i =0 training patterns for the optimized implementation are calculated as a subtraction: 255 1 P D [ i , n ] = ¯ � A [ n ] − P [ i , n ] = P [ i , n ] − P [ i , n ] . (2) 256 i =0 Zdenek Martinasek, Jan Hajny and Lukas Malina Optimization of Power Analysis Using Neural Network

  8. About Us Optimization Proposal Introduction Implementation of Optimization Optimization of Power Analysis Comparison of Classification Results Conclusion Comparison of Resulting Power Patterns Zdenek Martinasek, Jan Hajny and Lukas Malina Optimization of Power Analysis Using Neural Network

  9. About Us Optimization Proposal Introduction Implementation of Optimization Optimization of Power Analysis Comparison of Classification Results Conclusion Detail of Power Patterns 0.25 key 0 key 0 0.08 key 1 key 1 key 2 0.2 key 2 0.06 key 3 key 3 ... ... 0.15 0.04 0.1 0.02 I [A]  I [A]  0.05 0 0 -0.02 -0.05 -0.04 -0.1 -0.06 -0.08 5900 5920 5940 5960 5980 6000 6020 6040 6060 6080 5900 5920 5940 5960 5980 6000 6020 6040 6060 6080 t [n]  t [n]  Zdenek Martinasek, Jan Hajny and Lukas Malina Optimization of Power Analysis Using Neural Network

  10. About Us Optimization Proposal Introduction Implementation of Optimization Optimization of Power Analysis Comparison of Classification Results Conclusion Created Neural Network The neural network was created in MATLAB using the neural network toolbox, two-layer perceptron (MLP) was used, training set was realized by using 3 × 256 power traces, back propagation learning algorithm. Hidden units Outputs Inputs Y1 Z1 X1 X12000 Z100 Y256 Zdenek Martinasek, Jan Hajny and Lukas Malina Optimization of Power Analysis Using Neural Network

  11. About Us Optimization Proposal Introduction Implementation of Optimization Optimization of Power Analysis Comparison of Classification Results Conclusion Comparison of Classification Results A new set of 256 power traces corresponding to all secret key value was measured, whole set was subsequently classified. K sec ↓ Original implementation R Optimized implementation R D . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 0.00% 0.00% 6.46% . . . 0.00% 0.00% 92.86% 0.00% . . . 1 0.00% 66.42% 0.00% . . . 0.00% 99.87% 0.00% 0.00% . . . 0 36.77% 0.00% 0.00% . . . 98.23% 0.00% 0.00% 0.00% . . . K est → 0 1 2 0 1 2 3 . . . . . . Zdenek Martinasek, Jan Hajny and Lukas Malina Optimization of Power Analysis Using Neural Network

  12. About Us Optimization Proposal Introduction Implementation of Optimization Optimization of Power Analysis Comparison of Classification Results Conclusion Probability Vector for Five Secret Keys Probability of correct key estimates is increased and the other possible key estimates are suppressed (negative?). 100 100 K sec 5 K sec 5 90 90 K sec 41 K sec 41 K sec 81 K sec 81 80 80 K sec 129 K sec 129 70 70 K sec 248 K sec 248 60 60 P [%]  P [%]  50 50 40 40 30 30 20 20 10 10 0 0 0 50 100 150 200 250 0 50 100 150 200 250 K est  K es t  Zdenek Martinasek, Jan Hajny and Lukas Malina Optimization of Power Analysis Using Neural Network

  13. About Us Optimization Proposal Introduction Implementation of Optimization Optimization of Power Analysis Comparison of Classification Results Conclusion The Highest Selected Probabilities Investigation of all selected key estimates, theoretical success rate 80% was calculated in the original implementation. selected highest probability selected highest probability selected key estimate selected key estimate 100 100 250 250 90 90 80 80 200 200 70 70 60 150 60 150 P[%] P[%] K est K est 50 50 40 100 40 100 30 30 20 50 20 50 10 10 0 2500 0 2500 0 0 50 50 100 100 150 150 200 200 250 0 0 50 50 100 100 150 150 200 200 250 K sec  K sec  Zdenek Martinasek, Jan Hajny and Lukas Malina Optimization of Power Analysis Using Neural Network

  14. About Us Optimization Proposal Introduction Implementation of Optimization Optimization of Power Analysis Comparison of Classification Results Conclusion Histograms of Highest Probabilities The results confirm the increase of the maximum probabilities, number of keys potentially predisposed to wrong classification is reduced. 45 250 40 200 35 number of occurrences  number of occurrences  30 150 25 20 100 15 10 50 5 0 0 0 10 20 30 40 50 60 70 80 90 100 0 10 20 30 40 50 60 70 80 90 100 P [%]  P [%]  Zdenek Martinasek, Jan Hajny and Lukas Malina Optimization of Power Analysis Using Neural Network

  15. About Us Optimization Proposal Introduction Implementation of Optimization Optimization of Power Analysis Comparison of Classification Results Conclusion Cross-validation 2 , 560 power traces, 10 power traces for each key value, 10-fold cross-validation, 9 training traces and 1 testing in every step of validation, template attack: 256 templates, 9 interesting points. Step of cross-validation 1 2 3 4 5 6 7 8 9 10 err Success rate [%] Template err [ − ] 11 13 7 6 12 7 8 7 4 9 8.4 96.71 Original method err [ − ] 10 5 12 17 8 17 13 14 7 12 11.5 95.71 Optimized method err [ − ] 0 0 0 0 1 0 1 0 0 0 0.2 99.92 Zdenek Martinasek, Jan Hajny and Lukas Malina Optimization of Power Analysis Using Neural Network

Recommend


More recommend