Cryptology ePrint Archive: Report 2014/314
Improved Leakage Model Based on Genetic Algorithm
Zhenbin Zhang and Liji Wu and An Wang and Zhaoli Mu
Abstract: The classical leakage model usually exploits the power of one single S-box, which is called divide and conquer. Taking DES algorithm for example, the attack on each S-box needs to search the key space of 2^6 in a brute force way. Besides, 48-bit round key is limited to the result correctness of each single S-box. In this paper, we put forward a new leakage model based on the power consumption of multi S-box. The implementation of this method is combined with genetic algorithm. In DES algorithm, we can establish leakage model based on the Hamming distance of summing up 8 S-boxes. The genetic algorithm can search the key space of 2^48 to complete the attack of 8 S-boxes at the same time intelligently. And we also experimentally validate the fact that the leakage model of 8 S-boxes can decrease about 60% number of traces which is needed in the classical based on one single S-box in time domain and it also decreases about 33% number of traces in frequency domain. The IC card which is used in experiment is the training card 8 provided by Riscure Company.
Category / Keywords: DES, Genetic Algorithm, Side Channel Attack
Date: received 4 May 2014, last revised 6 May 2014
Contact author: zhangzb12 at mails tsinghua edu cn
Available format(s): PDF | BibTeX Citation
Note: This paper uses Genetic Algorithm to solve the construction of new leakage model which applied in SCA on DES.This paper connect Side Channel Attack with Artificial Intelligence
Version: 20140506:115417 (All versions of this report)
Short URL: ia.cr/2014/314
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]