SNOW-SCA: ML-assisted Side-Channel Attack on SNOW-V
arxiv(2024)
摘要
This paper presents SNOW-SCA, the first power side-channel analysis (SCA)
attack of a 5G mobile communication security standard candidate, SNOW-V,
running on a 32-bit ARM Cortex-M4 microcontroller. First, we perform a generic
known-key correlation (KKC) analysis to identify the leakage points. Next, a
correlation power analysis (CPA) attack is performed, which reduces the attack
complexity to two key guesses for each key byte. The correct secret key is then
uniquely identified utilizing linear discriminant analysis (LDA). The profiled
SCA attack with LDA achieves 100
which means the attack succeeds with just a single trace. Overall, using the
combined CPA and LDA attack model, the correct secret key byte is
recovered with <50 traces collected using the ChipWhisperer platform. The
entire 256-bit secret key of SNOW-V can be recovered incrementally using the
proposed SCA attack. Finally, we suggest low-overhead countermeasures that can
be used to prevent these SCA attacks.
更多查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要