4.3 Article

Breaking LPA-resistant cryptographic circuits with principal component analysis

期刊

INTEGRATION-THE VLSI JOURNAL
卷 80, 期 -, 页码 1-4

出版社

ELSEVIER
DOI: 10.1016/j.vlsi.2021.05.002

关键词

Principal component analysis; Eigenvalues and eigenvectors; Added false keys

向作者/读者索取更多资源

The paper proposes a novel hardware attack based on principal component analysis to efficiently break a leakage power analysis-resistant cryptographic circuit. The attack can remove all added false keys used in the LPA-resistant CC to expose the secret key, and only 2000 plaintexts are needed for success.
In this paper, a novel hardware attack based on principal component analysis (PCA) is proposed to break a leakage power analysis (LPA)-resistant cryptographic circuit (CC) efficiently. Although the added false keys which are used for masking the secret key of the LPA-resistant CC are secure and effective against regular LPA attacks, they may be precisely modeled by eigenvalues and eigenvectors under PCA. After performing the proposed PCA on the LPA-resistant CC, all the added false keys can be removed to expose the corresponding secret key. As shown in the result, only 2000 number of plaintexts are sufficient to crack an LPA-resistant CC by utilizing the proposed PCA-assisted LPA attacks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.3
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据