A side-channel attack on a masked and shuffled software implementation of Saber
نویسندگان
چکیده
Abstract In this paper, we show that a software implementation of IND-CCA-secure Saber key encapsulation mechanism protected by first-order masking and shuffling can be broken deep learning-based power analysis. Using an ensemble neural networks trained at the profiling stage, recover session secret from $$257 \times N$$ 257 × N $$24 257 24 traces, respectively, where N is number repetitions same measurement. The value depends on algorithm, type device under attack, environmental factors, acquisition noise, etc.; in our experiments $$N = 10$$ = 10 sufficient for successful attack. are combination 80% traces with known order 20% attack captured all-0 all-1 messages. “Spicing” training set helps us minimize negative effect inter-device variability.
منابع مشابه
a new algorithm and software of individual life insurance and annuity computation
چکیده ندارد.
15 صفحه اولeffect of sub-grid scales on large eddy simulation of particle deposition in a turbulent channel flow
چکیده ندارد.
15 صفحه اولDesign and Implementation of a Reactor Physics Laboratory Simulation Software
The basic structure of a reactor physics laboratory environment simulation software, developed using object modeling technique (OMT), and based on the reactor point kinetic equation, is presented. Also, various capabilities of the simulator in teaching the fundamental concepts of reactor physics are discussed. In this virtual laboratory, student can perform seven different experiments, ...
متن کاملa comparison of linguistic and pragmatic knowledge: a case of iranian learners of english
در این تحقیق دانش زبانشناسی و کاربردشناسی زبان آموزان ایرانی در سطح بالای متوسط مقایسه شد. 50 دانش آموز با سابقه آموزشی مشابه از شش آموزشگاه زبان مختلف در دو آزمون دانش زبانشناسی و آزمون دانش گفتار شناسی زبان انگلیسی شرکت کردند که سوالات هر دو تست توسط محقق تهیه شده بود. همچنین در این تحقیق کارایی کتابهای آموزشی زبان در فراهم آوردن درون داد کافی برای زبان آموزان ایرانی به عنوان هدف جانبی تحقیق ...
15 صفحه اولA New Side-Channel Attack on RSA Prime Generation
We introduce and analyze a side-channel attack on a straightforward implementation of the RSA key generation step. The attack exploits power information that allows to determine the number of the trial divisions for each prime candidate. Practical experiments are conducted, and countermeasures are proposed. For realistic parameters the success probability of our attack is in the order of 10–15 %.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cryptographic Engineering
سال: 2023
ISSN: ['2190-8508', '2190-8516']
DOI: https://doi.org/10.1007/s13389-023-00315-3