Machine-Learning-Based Side-Channel Evaluation of Elliptic-Curve Cryptographic FPGA Processor
Security of embedded systems is the need of the hour. A mathematically secure algorithm runs on a cryptographic chip on these systems, but secret private data can be at risk due to side-channel leakage information. This research focuses on retrieving secret-key information, by performing machine-lea...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2018-12-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | http://www.mdpi.com/2076-3417/9/1/64 |
id |
doaj-b8ff831dd3644ce09a9aae85fc54aec0 |
---|---|
record_format |
Article |
spelling |
doaj-b8ff831dd3644ce09a9aae85fc54aec02020-11-25T00:03:27ZengMDPI AGApplied Sciences2076-34172018-12-01916410.3390/app9010064app9010064Machine-Learning-Based Side-Channel Evaluation of Elliptic-Curve Cryptographic FPGA ProcessorNaila Mukhtar0Mohamad Ali Mehrabi1Yinan Kong2Ashiq Anjum3School of Engineering, Macquarie University, Sydney 2109, AustraliaSchool of Engineering, Macquarie University, Sydney 2109, AustraliaSchool of Engineering, Macquarie University, Sydney 2109, AustraliaDepartment of Computing and Mathematics, University of Derby, Derby DE22 1GB, UKSecurity of embedded systems is the need of the hour. A mathematically secure algorithm runs on a cryptographic chip on these systems, but secret private data can be at risk due to side-channel leakage information. This research focuses on retrieving secret-key information, by performing machine-learning-based analysis on leaked power-consumption signals, from Field Programmable Gate Array (FPGA) implementation of the elliptic-curve algorithm captured from a Kintex-7 FPGA chip while the elliptic-curve cryptography (ECC) algorithm is running on it. This paper formalizes the methodology for preparing an input dataset for further analysis using machine-learning-based techniques to classify the secret-key bits. Research results reveal how pre-processing filters improve the classification accuracy in certain cases, and show how various signal properties can provide accurate secret classification with a smaller feature dataset. The results further show the parameter tuning and the amount of time required for building the machine-learning models.http://www.mdpi.com/2076-3417/9/1/64side-channel analysispower-analysis attackembedded system securitymachine-learning classification |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Naila Mukhtar Mohamad Ali Mehrabi Yinan Kong Ashiq Anjum |
spellingShingle |
Naila Mukhtar Mohamad Ali Mehrabi Yinan Kong Ashiq Anjum Machine-Learning-Based Side-Channel Evaluation of Elliptic-Curve Cryptographic FPGA Processor Applied Sciences side-channel analysis power-analysis attack embedded system security machine-learning classification |
author_facet |
Naila Mukhtar Mohamad Ali Mehrabi Yinan Kong Ashiq Anjum |
author_sort |
Naila Mukhtar |
title |
Machine-Learning-Based Side-Channel Evaluation of Elliptic-Curve Cryptographic FPGA Processor |
title_short |
Machine-Learning-Based Side-Channel Evaluation of Elliptic-Curve Cryptographic FPGA Processor |
title_full |
Machine-Learning-Based Side-Channel Evaluation of Elliptic-Curve Cryptographic FPGA Processor |
title_fullStr |
Machine-Learning-Based Side-Channel Evaluation of Elliptic-Curve Cryptographic FPGA Processor |
title_full_unstemmed |
Machine-Learning-Based Side-Channel Evaluation of Elliptic-Curve Cryptographic FPGA Processor |
title_sort |
machine-learning-based side-channel evaluation of elliptic-curve cryptographic fpga processor |
publisher |
MDPI AG |
series |
Applied Sciences |
issn |
2076-3417 |
publishDate |
2018-12-01 |
description |
Security of embedded systems is the need of the hour. A mathematically secure algorithm runs on a cryptographic chip on these systems, but secret private data can be at risk due to side-channel leakage information. This research focuses on retrieving secret-key information, by performing machine-learning-based analysis on leaked power-consumption signals, from Field Programmable Gate Array (FPGA) implementation of the elliptic-curve algorithm captured from a Kintex-7 FPGA chip while the elliptic-curve cryptography (ECC) algorithm is running on it. This paper formalizes the methodology for preparing an input dataset for further analysis using machine-learning-based techniques to classify the secret-key bits. Research results reveal how pre-processing filters improve the classification accuracy in certain cases, and show how various signal properties can provide accurate secret classification with a smaller feature dataset. The results further show the parameter tuning and the amount of time required for building the machine-learning models. |
topic |
side-channel analysis power-analysis attack embedded system security machine-learning classification |
url |
http://www.mdpi.com/2076-3417/9/1/64 |
work_keys_str_mv |
AT nailamukhtar machinelearningbasedsidechannelevaluationofellipticcurvecryptographicfpgaprocessor AT mohamadalimehrabi machinelearningbasedsidechannelevaluationofellipticcurvecryptographicfpgaprocessor AT yinankong machinelearningbasedsidechannelevaluationofellipticcurvecryptographicfpgaprocessor AT ashiqanjum machinelearningbasedsidechannelevaluationofellipticcurvecryptographicfpgaprocessor |
_version_ |
1725433809527111680 |