Paper
12 January 2023 Design and implementation of a physical security evaluation system for cryptographic chips based on machine learning
Jiajing Liu, Congming Wei, Shengjun Wen, An Wang
Author Affiliations +
Proceedings Volume 12509, Third International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI 2022); 125092C (2023) https://doi.org/10.1117/12.2655942
Event: Third International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI 2022), 2022, Guangzhou, China
Abstract
Side-channel attack is a commonly used attack method for recovering cryptographic chip keys, and plays an important role in the field of cryptographic chip physical security evaluation. Combining side-channel attacks with machine learning and replacing some steps of traditional side-channel attacks with machine learning methods can improve the efficiency of key-recovery from side-channel attacks to a certain extent. In practice, there is a problem that most existing cryptographic chip security evaluation systems cannot support the complete key recovery process, and fully improve the utilization of side information generated in the evaluation process. In this paper, we design a cryptographic chip physical security evaluation system based on machine learning. Through the integrated operation of power trace acquisition, preprocessing, analysis and evaluation, the correct key can be successfully recovered.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jiajing Liu, Congming Wei, Shengjun Wen, and An Wang "Design and implementation of a physical security evaluation system for cryptographic chips based on machine learning", Proc. SPIE 12509, Third International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI 2022), 125092C (12 January 2023); https://doi.org/10.1117/12.2655942
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Neural networks

Machine learning

Information security

Computer security

Back to Top