期刊
INTEGRATION-THE VLSI JOURNAL
卷 80, 期 -, 页码 1-4出版社
ELSEVIER
DOI: 10.1016/j.vlsi.2021.05.002
关键词
Principal component analysis; Eigenvalues and eigenvectors; Added false keys
The paper proposes a novel hardware attack based on principal component analysis to efficiently break a leakage power analysis-resistant cryptographic circuit. The attack can remove all added false keys used in the LPA-resistant CC to expose the secret key, and only 2000 plaintexts are needed for success.
In this paper, a novel hardware attack based on principal component analysis (PCA) is proposed to break a leakage power analysis (LPA)-resistant cryptographic circuit (CC) efficiently. Although the added false keys which are used for masking the secret key of the LPA-resistant CC are secure and effective against regular LPA attacks, they may be precisely modeled by eigenvalues and eigenvectors under PCA. After performing the proposed PCA on the LPA-resistant CC, all the added false keys can be removed to expose the corresponding secret key. As shown in the result, only 2000 number of plaintexts are sufficient to crack an LPA-resistant CC by utilizing the proposed PCA-assisted LPA attacks.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据