Address Collision Attacks on ECSM Protected by ADPA
Title | Address Collision Attacks on ECSM Protected by ADPA |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Hong, Tang, Ju, Tailiang, Li, Yao |
Conference Name | 2020 17th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) |
Date Published | Dec. 2020 |
Publisher | IEEE |
ISBN Number | 978-1-6654-0505-8 |
Keywords | Address collision attack, Address-bit DPA, Analytical models, attack vectors, collision attack, Elliptic curve cryptography, Elliptic curves, Encryption, Human Behavior, Power demand, pubcrawl, resilience, Resiliency, Scalability, Side-channel attack, side-channel attacks, Support vector machines |
Abstract | Using the physical characteristics of the encryption device, an attacker can more easily obtain the key, which is called side-channel attack. Common side-channel attacks, such as simple power analysis (SPA) and differential power analysis (DPA), mainly focus on the statistical analysis of the data involved in the encryption algorithm, while there are relatively few studies on the Hamming weight of the addresses. Therefore, a new method of address-based Hamming weight analysis, address collision attack, is proposed in this research. The collision attack method (CA) and support vector machines algorithm (SVM) are used for analysis, meanwhile, the scalar multiplication implemented by protected address-bit DPA (ADPA) can be attack on the ChipWhisperer-Pro CW1200. |
URL | https://ieeexplore.ieee.org/document/9317495 |
DOI | 10.1109/ICCWAMTIP51612.2020.9317495 |
Citation Key | hong_address_2020 |