Side channel attacks which examine physical characteristics of a cryptographic algorithm, are getting much more popular in present days since it is easier to mount an attack in a short time with only a few hundred dollars’ worth of devices. Sensitive information of a cryptographic module can be easily identified by evaluating the side channel information, such as power consumption, heat and electromagnetic emissions that outputs from the cryptographic device. This creates a huge impact on the security of the cryptographic modules as it is an efficient technique to break cryptographic algorithms by analyzing the patterns of the side channel information without having any specialized knowledge in cryptography. The solution proposed in this paper is an algorithm modification system for symmetric algorithms in order to mitigate side channel attacks. This is achieved by injecting randomness to the algorithm following a comprehensive analysis of power fluctuations that outputs from a given algorithm. In the proposed solution, a hardware device tracks down the patterns in power consumption and analyze those meter readings by utilizing machine learning techniques. As a result of this analysis, it identifies the pattern generating source code positions. System will add random code fragments in to the identified positions in the algorithm without altering the output in order to resist side channel attacks.
CITATION STYLE
Pathirana, K. P. A. P., Lankarathne, L. R. M. O., Hangawaththa, N. H. A. D. A., Abeywardena, K. Y., & Kuruwitaarachchi, N. (2019). SEAMS: A symmetric encryption algorithm modification system to resist power based side channel attacks. In Advances in Intelligent Systems and Computing (Vol. 857, pp. 965–976). Springer Verlag. https://doi.org/10.1007/978-3-030-01177-2_70
Mendeley helps you to discover research relevant for your work.