A Novel Multi-Objective Electromagnetic Analysis Based on Genetic Algorithm
Abstract
:1. Introduction
- (1)
- We applied multi-objective optimization to correlation electromagnetic analysis to take full advantage of information. A genetic algorithm is the most popular heuristic approach to multi-objective optimization problems. So our method combines these two ways to recover the key which has seldom been studied in side-channel analysis.
- (2)
- In the past, traditional correlation electromagnetic analysis only focused on one byte of the key which may lose information and efficiency, because other bytes also contains partial information related to the secret key. So all bytes of the key are used in our method to take full advantage of information.
- (3)
- We also modify genetic algorithm to make our method more applicable in different scenarios. We add two operators—sort and sieve—to a genetic algorithm. For sort operator, we add it after selection, crossover and mutation. This operation will sort subkey candidates in descending order so that better candidates in different groups can be combined together with greater probability. For sieve operator, better key candidates selected in every generation will be sieved and recombined to obtain the best key candidate.
2. Related Works and Preliminaries
2.1. Related Works
2.2. Cryptographic Algorithm and Hamming Distance Model
2.3. Genetic Algorithm
- -
- Individual. The potential key candidates to the optimization problem are regarded as individuals.
- -
- Fitness. The objective function to evaluate the fitness of an individual is regarded as the fitness function.
- -
- Population. The population is a group of individuals initialized randomly.
- -
- The simple genetic algorithm is mainly composed of three operations:
- -
- Selection. This operator selects individuals in the population for reproduction. The fitter the individual, the more times it is likely to be selected.
- -
- Crossover. This operator exchanges key bits between two individuals selected randomly with the probability Pc to generate new individuals.
- -
- Mutation. This operator randomly flips some bits in an individual with a lower probability Pm to generate new individuals.
Algorithm 1 Simple Genetic Algorithm |
Input: max generation gen_max, size of population NIND, crossover rate Pc, mutation rate Pm Output: the optimal solution 1: key_cand = Initialization(NIND); 2: Fitness(key_cand); 3: gen = 0; 4: key_right = 0; 5: while gen < gen_max and key_right = = 0 do 6: Selection(key_cand); 7: Crossover(key_cand,Pc); 8: Mutation(key_cand,Pm); 9: Fitness(key_cand); 10: key_optimal = MaxFitness(key_cand); 11: gen = gen + 1; 12: if Vertification(key_optimal) = true then 13: key_right = 1 14: end if 15: end while 16: return key_optimal |
2.4. Multi-Objective Optimization
- (1)
- All key candidates in the group are equally divided into sub-groups by the subkey objective function;
- (2)
- Every subkey objective function is computed independently in the corresponding sub-group;
- (3)
- Individuals with high fitness in every sub-group are selected to form a new group;
- (4)
- Crossover and mutation are performed in the new group;
- (5)
- The sub-groups are recombined and the optimal one is found for multi-objective optimization.
3. Multi-Objective Electromagnetic Analysis Based on Genetic Algorithm (MOGAEMA)
3.1. MOGAEMA
Algorithm 2 Multi-Objective Genetic Algorithm |
Input: max generation gen_max, size of population NIND, crossover rate Pc, mutation rate Pm Output: the optimal solution 1: key_cand = Initialization(NIND); 2: subkey_cand = Divide(key_cand) 3: SubFitness(subkey_cand); 4: gen = 0; 5: key_right = 0; 6: while gen < gen_max and key_right = = 0 do 7: Selection(subkey_cand); 8: Crossover(subkey_cand,Pc); 9: Mutation(subkey_cand,Pm); 10: SubFitness(subkey_cand); 11: Sort(subkey_cand) 12: Recombine(subkey_cand); 13: Fitness(key_cand); 14: Selection(key_cand); 15: key_optimal_cand = MaxFitness(key_cand) 16: gen = gen + 1; 17: if Vertification(key_optimal_cand) = true then 18: key_optimal = key_optimal_cand; 19: key_right=1; 20: endif 21: end while 22: if (key_right=0) then 23: key_optimal = Sieve(key_optimal_cand) 24: end if 25: return key_optimal |
3.2. MOGAEMA Experimental Platform
4. Results
5. Conclusions and Future Work
Author Contributions
Funding
Conflicts of Interest
References
- Mangard, S.; Oswald, E.; Popp, T. Power Analysis Attacks: Revealing the Secrets of Smart Cards; Springer: Berlin/Heidelberg, Germany, 2007. [Google Scholar]
- Kocher, P.C. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 18–22 August 1996. [Google Scholar]
- Kocher, P.C.; Jaffe, J.M.; Jun, B.C. Differential Power Analysis. In Proceedings of the 19th Annual International Cryptology Conference, Santa Barbara, CA, USA, 15–19 August 1999. [Google Scholar]
- Brier, E.; Clavier, C.; Olivier, F. Correlation Power analysis with a leakage model. In Proceedings of the Conference on Cryptographic Hardware and Embedded Systems 2004, Cambridge, MA, USA, 11–13 August 2004. [Google Scholar]
- Chari, S.; Rao, J.R.; Rohatgi, P. Template Attacks. In Proceedings of the Cryptographic Hardware and Embedded Systems 2002, Redwood Shores, CA, USA, 13–15 August 2002. [Google Scholar]
- Choudary, M.O.; Kuhn, M.G. Efficient, Portable Template Attacks. IEEE Trans. Inf. Forensics Secur. 2018, 13, 490–501. [Google Scholar] [CrossRef] [Green Version]
- Boneh, D.; Demillo, R.A.; Lipton, R.J. On the importance of checking cryptographic protocols for faults. In Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, 11–15 May 1997. [Google Scholar]
- Agrawal, D.; Archambeault, B.; Rao, J.R.; Rohatgi, P. The EM Side-Channel(s). In Proceedings of the Cryptographic Hardware and Embedded Systems 2002, Redwood Shores, CA, USA, 13–15 August 2002. [Google Scholar]
- Carlier, V.; Chabanne, H.; Dottax, E.; Pelletier, H. Electromagnetic Side Channels of an FPGA Implementation of AES. Available online: https://eprint.iacr.org/2004/145.pdf (accessed on 15 December 2019)).
- Gandolfi, K.; Mourtel, C.; Olivier, F. Electromagnetic Analysis: Concrete Results. In Proceedings of the Cryptographic Hardware and Embedded Systems 2001, Paris, France, 14–16 May 2001. [Google Scholar]
- Ding, G.; Chu, J.; Yuan, L.; Zhao, Q. Correlation Electromagnetic Analysis for Cryptographic Device. In Proceedings of the 2009 Pacific-Asia Conference on Circuits, Communications and Systems, Chengdu, China, 16–17 May 2009. [Google Scholar]
- Kasper, T.; Oswald, D.; Paar, C. EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment. In Proceedings of the 10th Workshop on Information Security Applications, Busan, Korea, 25–27 August 2009. [Google Scholar]
- Li, Y.; Chen, M.; Wang, J. Introduction to side-channel attacks and fault attacks. In Proceedings of the Asia-Pacific International Symposium on Electromagnetic Compatibility (APEMC), Shenzhen, China, 17–21 May 2016. [Google Scholar]
- Hospodar, G.; Gierlichs, B.; De Mulder, E.; Verbauwhede, I.; Vandewalle, J. Machine learning in side-channel analysis: A first study. J. Cryptogr. Eng. 2011, 1, 293–302. [Google Scholar] [CrossRef]
- Lerman, L.; Bontempi, G.; Markowitch, O. Power analysis attack: An approach based on machine learning. IJACT 2014, 3, 97–115. [Google Scholar] [CrossRef] [Green Version]
- Sun, S.; Zhang, H.; Du, Y. The electromagnetic leakage analysis based on arithmetic operation of FPGA. In Proceedings of the 5th International Symposium on Electromagnetic Compatibility, Beijing, China, 28–31 October 2017. [Google Scholar]
- Picek, S.; Samiotis, I.P.; Kim, J.; Heuser, A.; Bhasin, S.; Legay, A.J.S. On the Performance of Convolutional Neural Networks for Side-channel Analysis. In Proceedings of the International Conference on Security, Privacy, and Applied Cryptography Engineering, Gandhinagar, India, 3–7 December 2018. [Google Scholar]
- Zhang, Z.; Wu, L.; Wang, A.; Mu, Z.; Zhang, X. A novel bit scalable leakage model based on genetic algorithm. Secur. Commun. Netw. 2015, 8, 3896–3905. [Google Scholar] [CrossRef]
- Ding, Y.; Wang, A.; Yiu, S.M. An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis. IACR Cryptol. Eprint Arch. 2019, 2019, 189. [Google Scholar]
- Li, J.-Q.; Sang, H.-Y.; Han, Y.-Y.; Wang, C.-G.; Gao, K.-Z. Efficient multi-objective optimization algorithm for hybrid flow shop scheduling problems with setup energy consumptions. J. Clean. Prod. 2018, 181, 584–598. [Google Scholar] [CrossRef]
- Amoozegar, M.; Minaei-Bidgoli, B. Optimizing multi-objective PSO based feature selection method using a feature elitism mechanism. Expert Syst. Appl. 2018, 113, 499–514. [Google Scholar] [CrossRef]
- Du, P.; Wang, J.; Guo, Z.; Yang, W. Research and application of a novel hybrid forecasting system based on multi-objective optimization for wind speed forecasting. Energy Convers. Manag. 2017, 150, 90–107. [Google Scholar] [CrossRef]
- Joan Daemen, V.R. The Design of Rijndael: AES—The Advanced Encryption Standard; Springer Science and Business Media: New York, NY, USA, 2002. [Google Scholar]
- Standard, N.F. Announcing the advanced encryption standard (AES). Fed. Inf. Process. Stand. Publ. 2001, 197, 1–51. [Google Scholar]
- Brier, E.; Clavier, C.; Olivier, F. Optimal Statistical Power Analysis. IACR Cryptol. Eprint Arch. 2003, 2003, 152. [Google Scholar]
- Srinivas, M.; Patnaik, L.M. Genetic algorithms: A survey. Computer 1994, 27, 17–26. [Google Scholar] [CrossRef]
- Goldberg, D.E. Genetic Algorithms in Search, Optimization, and Machine Learning; Addison-Wesley Professional: Boston, MA, USA, 1989; pp. 1–11. [Google Scholar]
- Pettersson, F.; Chakraborti, N.; Saxen, H. A genetic algorithms based multi-objective neural net applied to noisy blast furnace data. Appl. Soft Comput. 2007, 7, 387–397. [Google Scholar] [CrossRef]
- Konak, A.; Coit, D.W.; Smith, A.E. Multi-objective optimization using genetic algorithms: A tutorial. Reliab. Eng. Syst. Saf. 2006, 91, 992–1007. [Google Scholar] [CrossRef]
- Fonseca, C.M.; Fleming, P.J. Genetic Algorithms for Multiobjective Optimization: Formulation Discussion and Generalization. In Proceedings of the International Conference on Genetic Algorithms, Urbana-Champaign, IL, USA, June 1993; pp. 416–423. [Google Scholar]
- SAKURA Hardware Security Project. Available online: http://satoh.cs.uec.ac.jp/SAKURA/hardware/SAKURA-G.html (accessed on 16 October 2019).
- TeSCASE Group. Available online: http://tescase.coe.neu.edu/?current_page=POWER_TRACE_LINK (accessed on 16 October 2019).
- Evaluation Environment for Side-Channel Attacks. Available online: https://www.risec.aist.go.jp/project/sasebo/ (accessed on 16 October 2019).
- Side-Channel Attack Standard Evaluation Board (Sasebo): Sasebo-Gii. Available online: http://www.rcis.aist.go.jp/special/SASEBO/SASEBOGII-en.html (accessed on 16 October 2019).
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sun, S.; Zhang, H.; Dong, L.; Cui, X.; Cheng, W.; Khan, M.S. A Novel Multi-Objective Electromagnetic Analysis Based on Genetic Algorithm. Sensors 2019, 19, 5542. https://doi.org/10.3390/s19245542
Sun S, Zhang H, Dong L, Cui X, Cheng W, Khan MS. A Novel Multi-Objective Electromagnetic Analysis Based on Genetic Algorithm. Sensors. 2019; 19(24):5542. https://doi.org/10.3390/s19245542
Chicago/Turabian StyleSun, Shaofei, Hongxin Zhang, Liang Dong, Xiaotong Cui, Weijun Cheng, and Muhammad Saad Khan. 2019. "A Novel Multi-Objective Electromagnetic Analysis Based on Genetic Algorithm" Sensors 19, no. 24: 5542. https://doi.org/10.3390/s19245542