A novel bit scalable leakage model based on genetic algorithm

Size: px
Start display at page:

Download "A novel bit scalable leakage model based on genetic algorithm"

Transcription

1 SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2015; 8: Published online 24 August 2015 in Wiley Online Library (wileyonlinelibrary.com) RESEARCH ARTICLE A novel bit scalable leakage model based on genetic algorithm Zhenbin Zhang 1, Liji Wu 1 *, An Wang 1, Zhaoli Mu 2 and Xiangmin Zhang 1 1 Institute of Microelectronics, Tsinghua University, Beijing, China 2 Datang Microelectronics technology Co., Ltd., Beijing, China ABSTRACT With the growing popularity of smart integrated circuit (IC) cards, the chip security is attracting more and more attention. Researches on the attack and protection of smart IC cards have become increasingly hot. Side-channel attack is the practical and effective method, which has brought enormous threat. The efficiency of attack depends on the extent of the leakage model, which characterizes the practical applications. In the power analysis attack, the classical leakage model usually exploits the power consumption of single S-box, which is called divide and conquer. Taking data encryption standard (DES) algorithm, for example, the attack on each S-box needs to search the key space of 2 6 in a brute-force way. In this paper, we propose a novel leakage model, which is more flexible than the classical leakage model. The novel leakage model is based on the power consumption of multiple S-boxes, and the implementation of this method is combined with genetic algorithm. We can establish leakage model based on the Hamming distance of round output generated by eight S-boxes in DES algorithm. The experiment verifies the fact that the leakage model of eight S-boxes can decrease the traces number up to 52% than the classical one based on single S-box for DES algorithm. It also decreases the traces number up to 32% for SM4 algorithm. All the measurements of power data are acquired from a practical smart IC card. We also conclude that increasing noise, using variable clock, and limiting the lifetime of root key can be the choices of defensive strategy. Copyright 2015 John Wiley & Sons, Ltd. KEYWORDS bit scalable leakage model; genetic algorithm; correlation power analysis; DES and SM4 algorithms *Correspondence Liji Wu, Institute of Microelectronics, Tsinghua University, Beijing, China. lijiwu@mail.tsinghua.edu.cn 1. INTRODUCTION Leakage model plays an important role in power analysis attack. Attackers use it to establish the hypothetical power consumption of each different guess key to simulate the actual work state of cryptographic devices. With the development of power attack, the cognition of leakage model is becoming more and more accurate. Differential power analysis, which was used by Kocher [1,2] and formalized by Messerges et al. [3], just exploited 1-bit power information to classify the power traces. In [4 6], leakage model usually exploited the Hamming weight or Hamming distance of some bits in single S-box to depict the actual power consumption. In [7], correlation power analysis (CPA) was put forward. It pointed out that the correlation peak of full word (32 bits) was higher than that of partial (4 bits) predictions in a 32-bit architecture. If 32 bits are chosen as the target to calculate the correlation, it will be a big problem to guess all the keys in a brute way. The usual solution is to choose partial bits. These methods exhibit some limitations because of unrealistic assumptions and model imperfections. But it is obvious that the trend of leakage model is advancing toward the way, which can be closer to real power consumption. The key length in data encryption standard (DES) algorithm is 64 bits, which means if you want to guess the key in brute-force way, you have to try all 2 64 possible keys. Classical differential power analysis and CPA aim at attacking the 6 bits of key, which are used in single S- box. It is a classical divide-and-conquer strategy, which suggests that the key can be recovered by cracking the eight S-boxes separately. Appearance of the strategy is due to the reason that classical leakage model needs to search all 2 6 key spaces in a brute-force way. The poor 3896 Copyright 2015 John Wiley & Sons, Ltd.

2 searching ability extremely limits the key space, which results in the attacking target of choosing single S-box. While in fact, the leakage model based on single S-box is not so accurate. That is because in each round of DES, the output updating of the 32-bit round completes at the same time. The classical leakage model chooses the round output of single S-box as the attacking target, while regarding the other seven S-boxes as noise. That means the classical leakage model has discarded most of the power that can be available. Hamming weight or Hamming distance of the round output that corresponds to single S-box just ranges from 0 to 4. The problem is that single S-box may lead to low signal-to-noise ratio (SNR), while multiple S-boxes may bring the unacceptable searching key space. Our contribution. The novel contributions of this paper are as follows: (1) In this paper, we put forward a novel accurate leakage model, which is based on the power consumption of multiple S-boxes, and the accurate leakage can decrease the number of acquiring traces needed in power analysis attack. We use genetic algorithm (GA) to achieve the construction of multiple S- boxes leakage model in which searching space can be as large as Besides, it is worth mentioning that the searching ability of GA is also efficient. (2) We find the connection between GA and power analysis attack. It has a profound effect on raising efficiency of power analysis. Different kinds of intelligent algorithms and their parameters will affect the speed of convergence. And a better set of parameters can lead to the helpful searching path. But the optimal solution to the problem depends on the leakage model, which can be close to the actual power consumption. (3) Our work is of high scalability. The novel leakage model can also be applied for other cryptographic algorithms. And the leakage model is not limited to analyze S-box, and it is bit scalable. It can also be used for the predictable operation that happened concurrently, which leads to the superposition of power consumption. Organization. The paper is organized as follows. Section 2 introduces implementation of cryptographic algorithm and mathematical foundation of GA. Section 3 puts forward a novel leakage model based on multiple S- boxes. The method makes full use of the powerful searching ability of GA. Section 4 confirms the efficiency of novel leakage model with some experimental analyses on DES and SM4 (one of China s national standard algorithms). Section 5 analyzes the countermeasures against the novel leakage model. We conclude in Section PRELIMINARY 2.1. Cryptographic algorithms and Hamming distance model The implementation of cryptographic algorithms in hardware may have some predictable operations working concurrently. Usually, the implementation of DES allows the updating of round output completed at the same time in a 32-bit architecture. It can shorten the running time of DES and increase the safety to a certain extent. Hamming distance model reflects the power consumption of switching state. If the attack target is the output of round, the Hamming distance of round is defined as 1. P 1 is the inverse function of permutation in DES. Parameter i is the number of round, and j is the index of S-box. In 1, 4 bits of round can be generated from the corresponding S-box. So, all 32 bits of round output can be obtained from the eight S-boxes. HD Round i;j ¼ HW S-boxout;j P 1 ðl i 1 Þ j P 1 ðr i 1 Þ j (1) 2.2. Genetic algorithm In [8], Holland put forward the GA to solve optimization problem. GA is a search heuristic that mimics the process of natural selection. This heuristic is routinely used to generate useful solutions to optimization and searching problems. GA uses the searching techniques inspired by natural evolution, such as selection, crossover, and mutation. In GA, a population of candidate solutions, called individuals, to an optimization problem is evolved toward better solutions. Each candidate solution has a set of properties, which can be altered and mutated. Traditionally, solutions are represented in binary as strings of 0 and 1. A typical GA requires two key components. One is genetic representation of the solution domain. The other is fitness function to evaluate the solutions. The evolution usually starts from a population of randomly generated individuals. The population in each iteration is called a generation. In each generation, the fitness of every individual in the population is evaluated. And the fitness is usually the value of the objective function in the optimization problem to be solved. The individuals of better fitness value are stochastically selected from the current population, and each individual s genome is modified to form a new generation. The steps of GA are in the succeeding text. Parameter i is the number of generation, and n is the number of individuals in a generation. Crossover rate is denoted as p c, and mutation rate is denoted as p m. The parameter describes the rate of individuals, which selected from the father generation is denoted as p GGAP. 3897

3 Algorithm 1. Genetic Algorithm Input: Random solutions of the problem. Output: The optimization solution. 1. Encoding. Encoding (Key). 2. Set i = 0, n, pc,pm, pggap. Initialization (P(i)). 3. Fitness (P(i)). 4. Selection (P(i), pggap). 5. If random (0,1) < p c, then do crossover (P(i)). 6. If random (0,1) < pm, then do mutation (P(i)). 7. Best=Pick (Fitness (P(I))). i=i Key=Decoding (Best). 9. If DES (Plain, Key) = Cipher or i > max generation, then go to step 10. Otherwise go to step Output key MATH IN GENETIC ALGORITHM In [9 12], the mathematical foundation of GA is studied. First, we should know three definitions in GA in order to analyze the mathematical foundation: Definition 1. Let us consider a schema H taken from the three-letter alphabet, which is the assemblage of {0, 1, *}. And the star * is a don t-care or wild card symbol, which matches either a 0 or a 1 at a particular position. Definition 2. The order of a schema H, denoted by O(H), is simply the number of fixed position (the number of 0 s and 1 s in a binary alphabet) presented in the template. Definition 3. The defining length of a schema H, denoted by δ(h), is the distance between the first and last specific string positions. Theorem 1. (Schema theorem)lower order, aboveaverage schemata receives exponentially increasing trials in subsequent generation. mh; ð t þ 1Þ mh; ð tþ fðhþ δðhþ 1 p c f l 1 p moh ð Þ (2) mh; ð tþ fðhþ f ¼ mh; ð tþ*1þc ð Þ 1 ¼ ¼ mh; ð 0Þ*1þ ð c Þ tþ1 (3) mentioned in the equation earlier. In 2, if f(h) is bigger than f, m(h, t + 1) will be bigger than m(h, t). That means if the fitness of schema H is above the average value, the number of schema H increases exponentially. In a word, a particular schema grows with the ratio of the average fitness of the schema to the average fitness of the population. Put it in another way, schemata with fitness values above the population average will receive an increasing number of samples in the next generation, while schemata with fitness values below the population average will receive a decreasing number of samples. 3. A NOVEL ATTACK MODEL BASED ON GENETIC ALGORITHM 3.1. Main idea of attack model Instead of attacking the Hamming distance of round generated by single S-box, we try to analyze the Hamming distance of round generated by multiple S-boxes. As for cryptographic device, which updates 32 bits of round output concurrently, the better leakage model is to sum up the hypothetical power consumption generated by eight S-boxes. Figure 1 shows relationship between correlation coefficient and leakage model based on single S-box or multiple S-boxes. In Figure 1, Round i,1 j means the leakage model constructed by summing up the Hamming distances generated from S-box 1 to S-box j, where 1 j 8. Obviously, correlation of eight S-boxes leakage model is observably higher than that of single S-box. It means that leakage model generated by multiple S-boxes does not lose power information. Instead, it can be the better description of the actual power consumption. That is to say, it increases the SNR markedly. So the leakage model of eight S-boxes is more efficient and accurate than that of partial S-box. Hamming distance of leakage model generated by eight S-boxes can range from 0 to 32. So the challenge of novel efficient leakage where m(h, t) represents that there are m examples of a particular schema H contained within the population at a given time step t, f(h) is the average fitness of the strings representing schema H at time t, f is the average fitness of the strings representing all individuals at time t, l is the length of individual, and c is a constant that satisfies the equation of fðhþ ¼ ð1 þ cþf. Mathematical foundation of GA is the schema theorem. The theorem describes a fact that a particular schema H receives an expected number of copies in the next generation by the operation of reproduction, crossover, and mutation Figure 1. Relationship between correlation coefficient and leakage model of single S-box or multiple S-boxes. 3898

4 model is that the searching space can be as large as The huge searching space of 2 48 is definitely beyond the acceptable range in a brute-force way Procedure for novel leakage model Before starting the search of 2 48 key space, we must find the way to change the 48-bit DES round key into the solution of GA. The round key is in binary as strings of 0 s and 1 s, so we just make 48-bit of DES first round divided into eight segments. Each segment is 6-bit long. It completes the process of mapping from each segment to the corresponding S-box. Table I shows a mapping example. After the encoding process, we need to complete initialization. An initial population of n individual solutions is randomly generated. Table II shows an example. In one generation, we have to select the random solutions, which are close to the correct solution. We use fitness function to evaluate the fitness of each individual. In 4, fitness function on this question is defined as the correlation coefficient between the actual power consumption data and leakage model of eight S-boxes. " # Fitness ¼ corr Trace; 8 HD Round i;j where HD(Round i,j ) {0, 1, 2, 3, 4}. The higher the correlation is, the better the solution will be. By summing up the Hamming distance of round output, which is corresponding to eight S-boxes, the novel leakage power model is generated. Fitness function measures the quality of the represented solution. n individuals of each generation can obtain its own fitness. So we can sort them according to the ranking of fitness. Then the superior solutions are picked up to do the crossover and mutation operations. Table III shows the example of crossover operation, and Table IV shows the example of mutation operation. The positions changed by crossover and mutation operations are shown in italic. It is worth tuning parameters such as the crossover and mutation probabilities to find reasonable settings. In [13], a crossover rate that is too high may lead to premature convergence of the GA. A mutation rate that is too high may lead to loss of good solutions. A very small mutation rate may lead to the convergence of a wrong solution. After the selection, crossover, and mutation operations, some new individuals are generated. Then the fitness value of new individuals is calculated, and some superiors are chosen to replace the inferior in last generation. Now one round of iteration is finished. The whole iteration is over j¼1 (4) when the best solution is found or it reaches the maximum of generation. During the evolution process, GA will guarantee that the guessing key of each S-box can evolve to the correct key of S-box. Once a correct S-box key is searched, the current solution is more superior to the ones that cannot reach the correct S-box key. So the individuals that contain the correct segment, which maps the corresponding correct S-box key, will be kept generation by generation in that population. The survival of the fittest can be kept along. Because of the evolution, code of chromosome that represents the key can be optimized toward the global optimum solution. The global optimum solution picked up from the 2 48 key space is the correct 48-bit DES round key. As discussed earlier, we make a comparison between the classical and novel methods in the power analysis attack. In Figure 2, the classical method obtains keys of S- boxes separately, while the novel method that uses GA as the feedback to adjust the searching direction obtain the round key directly. The addition of hypothetical power consumption before the correlation calculation is a better simulation for the acquiring measurements of power consumption. 4. VERIFICATION AND COMPARISON 4.1. Verification on data encryption standard Set-up for attack on data encryption standard Nowadays, 3DES still plays an important role as a contemporary cipher. As the focus of attack in this paper is the S-box, so the process of attack 3DES is similar to DES, for DES is part of 3DES. We can obtain the first DES key, then second and third keys successively in 3DES. So we choose DES as an attack target. In order to verify that the novel leakage model is better than the classical one, we acquire actual power consumption traces of DES algorithm from a smart integrated circuit (IC) card. It is a hardware DES, and all 32 bits of round output will update at the same time. Figure 3 gives a brief framework of the smart card. Block cipher algorithms are the attack targets. The acquisition equipment is Power Tracer from Riscure Company. Figure 4 shows the power analysis platform and the smart IC card. The sampling rate of acquisition is 500 M/s. The external clock frequency is 4 MHz, with an inner clock frequency of 30 MHz. Table I. Mapping example between a random data encryption standard 48-bit key and the solution in genetic algorithm. X1 X2 X3 X4 X5 X6 X7 X8 Key Genome

5 Table II. Result example of initialization. X1 X2 X3 X4 X5 X6 X7 X n Table III. Example of crossover operation Crossover operation Table IV. Example of mutation operation Mutation operation Figure 2. Comparison between the classical method and novel method Experimental results of data encryption standard As we supposed, leakage model of multiple S-boxes is closer to actual power consumption. Firstly, we need to adjust the related parameters such as p GGAP, p c, p m, and n. We simply choose p GGAP = 1 in selection function, which means the size of child generation is the same as the father generation. Figure 5(a) shows that both p c and p m can make influence on generation. p c = 0.8 and p m = can be a proper set of parameters, which obtain the convergence rapidly. Figure 5(b) reveals that the number of generation decreases as the number of individuals in the population increases. For each number of population, we experiment 20 times to obtain the average number of generation. Finally, we choose n = 150 as the size of population. Figure 3. Framework of smart integrated circuit card and attack targets. DES, data encryption standard; SAC, security access control; RSA, crypto algorithm by rivest, shamir and adleman. In [14], Holland and Goldberg pointed out that GA operates n individuals in one generation, while it deals with O(n 3 ) schemata indirectly. Holland named it implicit parallelism. If n = 150, the generation of convergence is 110. GA deals with (150 * 110) schemata. As the related parameters are selected, GA begins with a population of individual solutions. And the algorithm searches the optimum matching path in parallel smartly. From Figure 6(a) and (b), we can see that the correlation coefficient of the correct key is separated from the others with the increasing number of traces. As we cannot calculate all 2 48 cases, we select partial of it. The bigger the number of correct S-boxes is, the more interference that comes from wrong round keys will be. We plot the cases of eight, seven, 3900

6 Figure 4. Power tracer equipment and the smart integrated circuit card. six S-boxes correct key and part of m S-boxes correct key, respectively, where m ranges from 0 to 5. In Figure 6(a), it just needs about 7000 traces to obtain all 48-bit DES keys of the first round, if we choose the leakage model generated by eight S-boxes to do the CPA in time domain. The reason correlation coefficient can range widely is that the searching solution maybe ranges from none S-box correct key to all the eight S-boxes correct key. It is of comparability when we also obtain all eight S-boxes correct key based on single S-box. In Figure 6(b), we just display the worst case of S-box. It shows that the number of trace is about , if we choose the leakage model of single S-box. The novel leakage model can decrease about 52% number of traces. Figure 7(a) shows the correlation based on eight S- boxes. With the increasing of correlation, solutions are closer to the correct key. In order to calculate the success rate of leakage model based on eight S-boxes and the classical leakage model based on single S-box, we restart to acquire 100 groups of power data, each group containing traces of power data. Figure 7(b) displays the success rates. If we choose the success rate of 90%, the number of leakage model based on eight S-boxes is 6700, while the number of leakage model based on single S-box is The leakage model of eight S-boxes can decrease up to 52%. It is meaningful in the situation where the number of acquiring traces is limited. For each generation consisted of 150 individuals, the correlation in GA should be calculated for about 150 * 110 = times, which costs 14 s. As a comparison, the correlation of classical CPA when attacking single S-box should be calculated for 512 times, in a term of 0.4 s. Although the calculation of correlation in GA is about 32 times of that in CPA attacking single S-box each time, the searching key space of GA is 2 48, which is much larger than searching key space of 2 6 in a brute-force way. It is valuable to extend the ability of searching, while the increasing calculation is also acceptable Verification on SM Set-up for attack on SM4 In order to verify that the novel leakage model can also be applied to other cryptographic algorithms, we choose SM4 algorithm as another attack target. SM4, formerly known as SMS4 algorithm, is the first official commercial cryptographic algorithm of China [15]. Figure 8 presents the framework of round function in SM4. The plain, cipher, and key of SM4 are all 128 bits. There are 32 rounds for SM4, and the key of each round is 32 bits long. The S-box of SM4 has eight inputs and eight outputs. Actually, SM4 algorithm is similar to AES-128. We acquired actual power consumption traces of SM4 algorithm from a smart IC card. It is a hardware SM4 and the inquiring of four S-boxes is serial. There is a 32-bit register to store each output of S-box. The acquisition equipment is Power Tracer from Riscure. The sampling rate is 500 M/s. The external clock frequency is 4 MHz, and the inner clock frequency is 30 MHz. In [16,17], it was pointed that CPA also works in frequency domain. The leakage model based on multiple S-boxes is also suitable for power attack in frequency (a) (b) Figure 5. Relationship between parameter of genetic algorithm and generation: (a) P c and P m and (b) population. 3901

7 (a) (b) Figure 6. Relationship between correlation and number of trace: (a) eight S-boxes and (b) single S-box. (a) (b) Figure 7. Results of leakage model of eight S-boxes by genetic algorithm: (a) iteration of searching maximum correlation and (b) success rate and number of trace. domain. Power attack used in frequency domain is supported by the Parseval Theorem. The Parseval Theorem reveals that the total energy contained in a waveform summed across all of time is equal to the total energy of the waveform s Fourier transform summed across all of its frequency components. Figure 8. Framework of round function in SM4 cryptographic algorithm Experimental results of SM4 The Hamming distance of S-box output is chosen as the attack target. Considering the inquiring of four S-boxes is serial, we switch the power data from time domain to frequency domain. It makes the updating of multiple S-boxes output possible to be gathered at the same frequency. The related parameters of GA, such as pggap, pc, pm, and n, also need to be reselected. For the same steps like GA used in DES, we finally choose pggap = 1, pc = 0.6, pm = 0.02, and n = 100. The relationship between correlation and the number of trace has been displayed in Figure 9(a) and (b). The

8 (a) (b) Figure 9. Relationship between correlation and number of trace: (a) four S-boxes and (b) single S-box. phenomenon is that correct key can be separated from the others with the increasing number of traces. In Figure 9 (a), the leakage model of four S-boxes is applied to do the CPA in frequency domain. It reveals that traces are needed to obtain the 32-bit SM4 key of the first round. In order to make the result shown in Figure 9(a) be of comparability, it is necessary to obtain all four S-boxes correct key based on single S-box. In Figure 9(b), the worst case of S-box is selected. The number of trace is , if we choose the leakage model of single S-box. It is obvious that it can decrease about 32% number of traces when the novel leakage model is applied. The process of convergence based on four S-boxes is displayed in Figure 10(a). The best solution is closer to the correct key with the increasing of generation. In order to obtain the average generation number of convergence, 20 experiments have been conducted. It shows that number of obtaining the convergence is about 40. To calculate the success rate of leakage model based on four S-boxes and the classical leakage model based on single S-box, we acquire 50 groups of power data, traces per group. The related results are shown in Figure 10(b). When the success rate of 90% is focused on, the number of leakage model based on four S-boxes is , and the number of leakage model based on single S-box is Thirty-two percent traces are decreased when the leakage model of four S-boxes is used. Also, the calculation of correlation in GA takes time. For each generation with 100 individuals, it calculates 100 * 40 = 4000 times, which costs 34.7 s. While the calculation is 1024 times in classical CPA attacking using single S-box. And the process of calculation costs 4.4 s. It is deserved to describe the hypothesis energy more accurate when the calculation is afford Comparison between novel model and classical model After the experimental verification on DES and SM4, we use GA to achieve the construction of novel leakage model generated by multiple S-boxes. From the result, we can confirm that the novel leakage model based on multiple S-boxes is more efficient, and the needed number of traces is much smaller than that of leakage model based on single S-box. So it is proved that the efficiency of leakage model based on multiple S-boxes is enhanced and GA does not bring unacceptable calculation when searching huge key space. Finally, we make a comparison between novel leakage model and classical leakage model as Table V shows. In a word, no matter what the case is in time domain or frequency domain, leakage model of multiple S-boxes is much more powerful than the classical leakage model of single S-box. 5. COUNTERMEASURES ANALYSIS As the attack experiments on DES and SM4 is finished, we have drawn the conclusion that leakage model of multiple S-boxes is much more efficient in the power analysis attack. The purpose of research on attack method is to obtain the better defensive strategy. Some better countermeasures should be adopted to enhance the security of the smart IC card. Ideas of solution can be considered in circuit level and algorithm level. As the core idea of novel leakage model is to increase the SNR, reducing the SNR from other means can be a protective solution. In circuit level, specific measures can be increasing the number of noise source or using the variable clock, which can randomize the signal in both time domain and frequency domain. In algorithm level, the application of session key can reduce the leakage information of root key. Each acquiring power trace contains different keys, this makes CPA out of work in statistics. Another strategy is to limit the lifetime of root key, which makes the attackers cannot obtain the enough traces to analyze. In conclusion, the defensive strategy should exploit a combination of several countermeasures mentioned earlier. 3903

9 (a) (b) Figure 10. Results of leakage model of four S-boxes by genetic algorithm: (a) iteration of searching maximum correlation and (b) success rate and number of trace. Table V. Compare the number of power trace needed, running time, and calculation amount of correlation between the novel leakage model and the classical leakage model. Leakage model Multiple S-boxes Single S-box Number of traces DES SM Running time DES 14 s 0.4 s SM s 4.4 s Calculation amount DES SM DES, data encryption standard. 6. CONCLUSIONS In this paper, we put forward a novel accurate leakage model, which is based on the power consumption of multiple S-boxes. The novel leakage model has high SNR than the classical leakage model. We use GA to achieve the construction of multiple S-boxes leakage model in which searching space can be as large as The improved leakage model accurately reflects the actual power consumption of cryptographic devices than that of classical leakage model based on single S-box. We also experimentally validate the fact that leakage model of multiple S- boxes is more efficient than the classical leakage model. The accurate leakage can decrease the number of acquiring traces needed in power analysis attack, while the quantity of increasing calculation generated by GA is acceptable. This paper combines the GA with power analysis attack. It has a profound effect on raising efficiency of power analysis. And we turn the construction of leakage model into the problem, which searches the optimization solution in a huge space. We exploit the intelligent searching ability of GA to improve the leakage model used for power attack. Our work is of high scalability. Novel leakage model based on GA has the quality of universality. The attack target of novel leakage model is not only used for multiple S-boxes in parallel but also used for some predicting power accumulation because of working state in parallel. Establishment of novel leakage model can be adjusted to actual power consumption of cryptographic devices manually. So it is bit scalable. And also, the ability of intelligent searching space increases with the development of intelligent algorithm. As an avenue for further research, this work connects the artificial intelligence algorithm with power analysis. GA is just one kind of artificial intelligence algorithms, which can generate useful solutions to optimization and searching problems. There is still room for improving the speed of convergence and definition of optimization solution. ACKNOWLEDGEMENTS This work is supported by National Science and Technology Major Project on Core Electronic Devices, Highend General Chips and Fundamental Software Product (no. 2014ZX ). REFERENCES 1. Kocher P, Jaffe J, Jun B. Differential power analysis. In Advances in Cryptology CRYPTO 99. Springer: Heidelberg, 1999; Kocher P, Jaffe J, Jun B, Rohatgi P. Introduction to differential power analysis. Journal of Cryptographic Engineering 2011; 1(1): Messerges TS, Dabbish EA, Sloan RH. Investigations of Power Analysis Attacks on Smartcards. : USENIX workshop on Smartcard Technology, Coron J-S, Kocher P, Naccache D. Statistics and secret leakage. In Financial Cryptography, Vol Springer: Heidelberg,

10 5. Mayer-Sommer R. Smartly analyzing the simplicity and the power of simple power analysis on smartcards. In Cryptographic Hardware and Embedded Systems CHES, Vol Springer: Heidelberg, 2000; Oswald, E. On side-channel attacks and the application of algorithmic countermeasures. A PhD Thesis in Graz University of Technology, IAIK, Brier, E., Clavier, C., Olivier, F. Correlation power analysis with a leakage model. Cryptographic Hardware and Embedded Systems-CHES 2004, Springer: Heidelberg, 2004; Holland JH. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence. U Michigan Press, Forrest S, Mitchell M. What makes a problem hard for a genetic algorithm? Some anomalous results and their explanation. Machine Learning 1993; 13(2 3): Goldberg DE. Genetic Algorithms and Walsh Functions: A Gentle Introduction. Department of Mechanical Engineering, University of Alabama: Clearinghouse for Genetic Algorithms, Goldberg DE. Genetic Algorithms in Search, Optimization, and Machine Learning. Addison-Wesley Reading Menlo Park, Whitley, L.D. The GENITOR algorithm and selection pressure: why rank-based allocation of reproductive trials is best. In. ICGA Vol. 89, 1989; Schlierkamp-Voosen, D. Optimal interaction of mutation and crossover in the breeder genetic algorithm. In: Proc. of Fifth Int. Conf. on Genetic Algorithms (ICGA-93), Morgan Kaufmann, Goldberg, David Edward. Optimal initial population size for binary-coded genetic algorithms. Clearinghouse for Genetic Algorithms, Department of Engineering Mechanics, University of Alabama, Office of State Commercial Cipher Administration. SMS4 cipher for WLAN products [EB/OL], pdf. 16. Sugawara T, Hayashi Y-i, Homma N, Mizuki T, Aoki T, Sone H, Satoh A. Spectrum analysis on cryptographic modules to counteract side-channel attacks. In EMC, Vol ; Tiu CC. A new Frequency-based Side Channel Attack for Embedded Systems. University of Waterloo,

Improved Leakage Model Based on Genetic Algorithm

Improved Leakage Model Based on Genetic Algorithm Improved Leakage Model Based on Genetic Algorithm Zhenbin Zhang 1, Liji Wu 2, An Wang 3, Zhaoli Mu 4 May 4, 2014 Abstract. The classical leakage model usually exploits the power of one single S-box, which

More information

A Power Attack Method Based on Clustering Ruo-nan ZHANG, Qi-ming ZHANG and Ji-hua CHEN

A Power Attack Method Based on Clustering Ruo-nan ZHANG, Qi-ming ZHANG and Ji-hua CHEN 2017 International Conference on Computer, Electronics and Communication Engineering (CECE 2017) ISBN: 978-1-60595-476-9 A Power Attack Method Based on Clustering Ruo-nan ZHANG, Qi-ming ZHANG and Ji-hua

More information

A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis

A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis V.S.Subarsana 1, C.K.Gobu 2 PG Scholar, Member IEEE, SNS College of Engineering, Coimbatore, India 1 Assistant Professor

More information

Similarity Templates or Schemata. CS 571 Evolutionary Computation

Similarity Templates or Schemata. CS 571 Evolutionary Computation Similarity Templates or Schemata CS 571 Evolutionary Computation Similarities among Strings in a Population A GA has a population of strings (solutions) that change from generation to generation. What

More information

Genetic Algorithm Performance with Different Selection Methods in Solving Multi-Objective Network Design Problem

Genetic Algorithm Performance with Different Selection Methods in Solving Multi-Objective Network Design Problem etic Algorithm Performance with Different Selection Methods in Solving Multi-Objective Network Design Problem R. O. Oladele Department of Computer Science University of Ilorin P.M.B. 1515, Ilorin, NIGERIA

More information

Adaptive Crossover in Genetic Algorithms Using Statistics Mechanism

Adaptive Crossover in Genetic Algorithms Using Statistics Mechanism in Artificial Life VIII, Standish, Abbass, Bedau (eds)(mit Press) 2002. pp 182 185 1 Adaptive Crossover in Genetic Algorithms Using Statistics Mechanism Shengxiang Yang Department of Mathematics and Computer

More information

Efficient DPA Attacks on AES Hardware Implementations

Efficient DPA Attacks on AES Hardware Implementations I. J. Communications, Network and System Sciences. 008; : -03 Published Online February 008 in SciRes (http://www.srpublishing.org/journal/ijcns/). Efficient DPA Attacks on AES Hardware Implementations

More information

Timing Attack Prospect for RSA Cryptanalysts Using Genetic Algorithm Technique

Timing Attack Prospect for RSA Cryptanalysts Using Genetic Algorithm Technique 80 The International Arab Journal of Information Technology, Vol. 1, No. 1, January 2004 Timing Attack Prospect for RSA Cryptanalysts Using Genetic Algorithm Technique Hamza Ali and Mikdam Al-Salami Computer

More information

A Genetic Algorithm for Graph Matching using Graph Node Characteristics 1 2

A Genetic Algorithm for Graph Matching using Graph Node Characteristics 1 2 Chapter 5 A Genetic Algorithm for Graph Matching using Graph Node Characteristics 1 2 Graph Matching has attracted the exploration of applying new computing paradigms because of the large number of applications

More information

Evolutionary Computation Part 2

Evolutionary Computation Part 2 Evolutionary Computation Part 2 CS454, Autumn 2017 Shin Yoo (with some slides borrowed from Seongmin Lee @ COINSE) Crossover Operators Offsprings inherit genes from their parents, but not in identical

More information

Second-Order Power Analysis Attacks against Precomputation based Masking Countermeasure

Second-Order Power Analysis Attacks against Precomputation based Masking Countermeasure , pp.259-270 http://dx.doi.org/10.14257/ijsh.2016.10.3.25 Second-Order Power Analysis Attacks against Precomputation based Masking Countermeasure Weijian Li 1 and Haibo Yi 2 1 School of Computer Science,

More information

A Simple Power Analysis Attack Against the Key Schedule of the Camellia Block Cipher

A Simple Power Analysis Attack Against the Key Schedule of the Camellia Block Cipher A Simple Power Analysis Attack Against the Key Schedule of the Camellia Block Cipher Lu Xiao and Howard M. Heys 2 QUALCOMM Incorporated, lxiao@qualcomm.com 2 Electrical and Computer Engineering, Faculty

More information

1. Introduction. 2. Motivation and Problem Definition. Volume 8 Issue 2, February Susmita Mohapatra

1. Introduction. 2. Motivation and Problem Definition. Volume 8 Issue 2, February Susmita Mohapatra Pattern Recall Analysis of the Hopfield Neural Network with a Genetic Algorithm Susmita Mohapatra Department of Computer Science, Utkal University, India Abstract: This paper is focused on the implementation

More information

International Journal of Scientific & Engineering Research Volume 8, Issue 10, October-2017 ISSN

International Journal of Scientific & Engineering Research Volume 8, Issue 10, October-2017 ISSN 194 Prime Number Generation Using Genetic Algorithm Arpit Goel 1, Anuradha Brijwal 2, Sakshi Gautam 3 1 Dept. Of Computer Science & Engineering, Himalayan School of Engineering & Technology, Swami Rama

More information

Lecture 6: The Building Block Hypothesis. Genetic Algorithms and Genetic Programming Lecture 6. The Schema Theorem Reminder

Lecture 6: The Building Block Hypothesis. Genetic Algorithms and Genetic Programming Lecture 6. The Schema Theorem Reminder Lecture 6: The Building Block Hypothesis 1 Genetic Algorithms and Genetic Programming Lecture 6 Gillian Hayes 9th October 2007 The Building Block Hypothesis Experimental evidence for the BBH The Royal

More information

Genetic Algorithms and Genetic Programming Lecture 7

Genetic Algorithms and Genetic Programming Lecture 7 Genetic Algorithms and Genetic Programming Lecture 7 Gillian Hayes 13th October 2006 Lecture 7: The Building Block Hypothesis The Building Block Hypothesis Experimental evidence for the BBH The Royal Road

More information

Side channel attack: Power Analysis. Chujiao Ma, Z. Jerry Shi CSE, University of Connecticut

Side channel attack: Power Analysis. Chujiao Ma, Z. Jerry Shi CSE, University of Connecticut Side channel attack: Power Analysis Chujiao Ma, Z. Jerry Shi CSE, University of Connecticut Conventional Cryptanalysis Conventional cryptanalysis considers crypto systems as mathematical objects Assumptions:

More information

Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks

Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks Elisabeth Oswald and Manfred Aigner Institute for Applied Information Processing and Communications Graz University of Technology,

More information

An Application of Genetic Algorithm for Auto-body Panel Die-design Case Library Based on Grid

An Application of Genetic Algorithm for Auto-body Panel Die-design Case Library Based on Grid An Application of Genetic Algorithm for Auto-body Panel Die-design Case Library Based on Grid Demin Wang 2, Hong Zhu 1, and Xin Liu 2 1 College of Computer Science and Technology, Jilin University, Changchun

More information

Genetic Algorithm for Finding Shortest Path in a Network

Genetic Algorithm for Finding Shortest Path in a Network Intern. J. Fuzzy Mathematical Archive Vol. 2, 2013, 43-48 ISSN: 2320 3242 (P), 2320 3250 (online) Published on 26 August 2013 www.researchmathsci.org International Journal of Genetic Algorithm for Finding

More information

On Boolean and Arithmetic Masking against Differential Power Analysis

On Boolean and Arithmetic Masking against Differential Power Analysis On Boolean and Arithmetic Masking against Differential Power Analysis [Published in Ç.K. Koç and C. Paar, Eds., Cryptographic Hardware and Embedded Systems CHES 2000, vol. 1965 of Lecture Notes in Computer

More information

CHAPTER 4 GENETIC ALGORITHM

CHAPTER 4 GENETIC ALGORITHM 69 CHAPTER 4 GENETIC ALGORITHM 4.1 INTRODUCTION Genetic Algorithms (GAs) were first proposed by John Holland (Holland 1975) whose ideas were applied and expanded on by Goldberg (Goldberg 1989). GAs is

More information

Improved Attack on Full-round Grain-128

Improved Attack on Full-round Grain-128 Improved Attack on Full-round Grain-128 Ximing Fu 1, and Xiaoyun Wang 1,2,3,4, and Jiazhe Chen 5, and Marc Stevens 6, and Xiaoyang Dong 2 1 Department of Computer Science and Technology, Tsinghua University,

More information

An Improved DPA Attack on DES with Forth and Back Random Round Algorithm

An Improved DPA Attack on DES with Forth and Back Random Round Algorithm International Journal of Network Security, Vol.19, No.2, PP.285-294, Mar. 2017 (DOI: 10.6633/IJNS.201703.19(2).13) 285 An Improved DPA Attack on with Forth and Back Random Round Algorithm Cai-Sen Chen

More information

Power Analysis Attacks

Power Analysis Attacks Power Analysis Attacks Elisabeth Oswald Computer Science Department Crypto Group eoswald@cs.bris.ac.uk Elisabeth.Oswald@iaik.tugraz.at Outline Working principle of power analysis attacks DPA Attacks on

More information

A New Attack with Side Channel Leakage during Exponent Recoding Computations

A New Attack with Side Channel Leakage during Exponent Recoding Computations A New Attack with Side Channel Leakage during Exponent Recoding Computations Yasuyuki Sakai 1 and Kouichi Sakurai 2 1 Mitsubishi Electric Corporation, 5-1-1 Ofuna, Kamakura, Kanagawa 247-8501, Japan ysakai@iss.isl.melco.co.jp

More information

Power Analysis of MAC-Keccak: A Side Channel Attack. Advanced Cryptography Kyle McGlynn 4/12/18

Power Analysis of MAC-Keccak: A Side Channel Attack. Advanced Cryptography Kyle McGlynn 4/12/18 Power Analysis of MAC-Keccak: A Side Channel Attack Advanced Cryptography Kyle McGlynn 4/12/18 Contents Side-Channel Attack Power Analysis Simple Power Analysis (SPA) Differential Power Analysis (DPA)

More information

Side Channel Analysis of an Automotive Microprocessor

Side Channel Analysis of an Automotive Microprocessor ISSC 2008, Galway. June 18 19 Side Channel Analysis of an Automotive Microprocessor Mark D. Hamilton, Michael Tunstall,EmanuelM.Popovici, and William P. Marnane Dept. of Microelectronic Engineering, Dept.

More information

Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic Algorithm and Particle Swarm Optimization

Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic Algorithm and Particle Swarm Optimization 2017 2 nd International Electrical Engineering Conference (IEEC 2017) May. 19 th -20 th, 2017 at IEP Centre, Karachi, Pakistan Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic

More information

The Genetic Algorithm for finding the maxima of single-variable functions

The Genetic Algorithm for finding the maxima of single-variable functions Research Inventy: International Journal Of Engineering And Science Vol.4, Issue 3(March 2014), PP 46-54 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.com The Genetic Algorithm for finding

More information

DPA CONTEST 08/09 A SIMPLE IMPROVEMENT OF CLASSICAL CORRELATION POWER ANALYSIS ATTACK ON DES

DPA CONTEST 08/09 A SIMPLE IMPROVEMENT OF CLASSICAL CORRELATION POWER ANALYSIS ATTACK ON DES DPA CONTEST 08/09 A SIMPLE IMPROVEMENT OF CLASSICAL CORRELATION POWER ANALYSIS ATTACK ON DES, Fakultät für Informatik Antonio Almeida Prof. Dejan Lazich Karlsruhe, 9 th June 2010 KIT Universität des Landes

More information

HOST Differential Power Attacks ECE 525

HOST Differential Power Attacks ECE 525 Side-Channel Attacks Cryptographic algorithms assume that secret keys are utilized by implementations of the algorithm in a secure fashion, with access only allowed through the I/Os Unfortunately, cryptographic

More information

Automated Test Data Generation and Optimization Scheme Using Genetic Algorithm

Automated Test Data Generation and Optimization Scheme Using Genetic Algorithm 2011 International Conference on Software and Computer Applications IPCSIT vol.9 (2011) (2011) IACSIT Press, Singapore Automated Test Data Generation and Optimization Scheme Using Genetic Algorithm Roshni

More information

Artificial Intelligence Application (Genetic Algorithm)

Artificial Intelligence Application (Genetic Algorithm) Babylon University College of Information Technology Software Department Artificial Intelligence Application (Genetic Algorithm) By Dr. Asaad Sabah Hadi 2014-2015 EVOLUTIONARY ALGORITHM The main idea about

More information

Non-Profiled Deep Learning-Based Side-Channel Attacks

Non-Profiled Deep Learning-Based Side-Channel Attacks Non-Profiled Deep Learning-Based Side-Channel Attacks Benjamin Timon UL Transaction Security, Singapore benjamin.timon@ul.com Abstract. Deep Learning has recently been introduced as a new alternative to

More information

Partitioning Sets with Genetic Algorithms

Partitioning Sets with Genetic Algorithms From: FLAIRS-00 Proceedings. Copyright 2000, AAAI (www.aaai.org). All rights reserved. Partitioning Sets with Genetic Algorithms William A. Greene Computer Science Department University of New Orleans

More information

Genetic Algorithms. Kang Zheng Karl Schober

Genetic Algorithms. Kang Zheng Karl Schober Genetic Algorithms Kang Zheng Karl Schober Genetic algorithm What is Genetic algorithm? A genetic algorithm (or GA) is a search technique used in computing to find true or approximate solutions to optimization

More information

Binary Representations of Integers and the Performance of Selectorecombinative Genetic Algorithms

Binary Representations of Integers and the Performance of Selectorecombinative Genetic Algorithms Binary Representations of Integers and the Performance of Selectorecombinative Genetic Algorithms Franz Rothlauf Department of Information Systems University of Bayreuth, Germany franz.rothlauf@uni-bayreuth.de

More information

Network Routing Protocol using Genetic Algorithms

Network Routing Protocol using Genetic Algorithms International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:0 No:02 40 Network Routing Protocol using Genetic Algorithms Gihan Nagib and Wahied G. Ali Abstract This paper aims to develop a

More information

Deciphering of Transposition Ciphers using Genetic Algorithm

Deciphering of Transposition Ciphers using Genetic Algorithm 41 Deciphering of Transposition Ciphers using Genetic Algorithm 1 Alok Singh Jadaun, 2 Vikas Chaudhary, 3 Lavkush Sharma, 4 Gajendra Pal Singh 1, 2 Department Of Computer Science & Engineering Bhagwant

More information

Security against Timing Analysis Attack

Security against Timing Analysis Attack International Journal of Electrical and Computer Engineering (IJECE) Vol. 5, No. 4, August 2015, pp. 759~764 ISSN: 2088-8708 759 Security against Timing Analysis Attack Deevi Radha Rani 1, S. Venkateswarlu

More information

GENETIC ALGORITHM with Hands-On exercise

GENETIC ALGORITHM with Hands-On exercise GENETIC ALGORITHM with Hands-On exercise Adopted From Lecture by Michael Negnevitsky, Electrical Engineering & Computer Science University of Tasmania 1 Objective To understand the processes ie. GAs Basic

More information

Genetic Algorithms with Mapreduce Runtimes

Genetic Algorithms with Mapreduce Runtimes Genetic Algorithms with Mapreduce Runtimes Fei Teng 1, Doga Tuncay 2 Indiana University Bloomington School of Informatics and Computing Department CS PhD Candidate 1, Masters of CS Student 2 {feiteng,dtuncay}@indiana.edu

More information

Differential Power Analysis in AES: A Crypto Anatomy

Differential Power Analysis in AES: A Crypto Anatomy Jude Angelo Ambrose Naeill Aldon Aleksandar Ignjatovic Sri Parameswaran School of Computer Science and Engineering University of New South Wales, Sydney, Australia {ajangelo, naeill, ignjat, sridevan}@cse.unsw.edu.au

More information

Power-Analysis Attack on an ASIC AES implementation

Power-Analysis Attack on an ASIC AES implementation Power-Analysis Attack on an ASIC AES implementation Sıddıka Berna Örs 1 Frank Gürkaynak 2 Elisabeth Oswald 3,4 Bart Preneel 1 1 Katholieke Universiteit Leuven, Dept. ESAT/SCD-COSIC, Kasteelpark Arenberg

More information

The Parallel Software Design Process. Parallel Software Design

The Parallel Software Design Process. Parallel Software Design Parallel Software Design The Parallel Software Design Process Deborah Stacey, Chair Dept. of Comp. & Info Sci., University of Guelph dastacey@uoguelph.ca Why Parallel? Why NOT Parallel? Why Talk about

More information

Using Genetic Algorithms in Integer Programming for Decision Support

Using Genetic Algorithms in Integer Programming for Decision Support Doi:10.5901/ajis.2014.v3n6p11 Abstract Using Genetic Algorithms in Integer Programming for Decision Support Dr. Youcef Souar Omar Mouffok Taher Moulay University Saida, Algeria Email:Syoucef12@yahoo.fr

More information

Game theory and non-linear dynamics: the Parrondo Paradox case study

Game theory and non-linear dynamics: the Parrondo Paradox case study Chaos, Solitons and Fractals 17 (2003) 545 555 www.elsevier.com/locate/chaos Game theory and non-linear dynamics: the Parrondo Paradox case study P. Arena, S. Fazzino, L. Fortuna *, P. Maniscalco Dipartimento

More information

Hyperplane Ranking in. Simple Genetic Algorithms. D. Whitley, K. Mathias, and L. Pyeatt. Department of Computer Science. Colorado State University

Hyperplane Ranking in. Simple Genetic Algorithms. D. Whitley, K. Mathias, and L. Pyeatt. Department of Computer Science. Colorado State University Hyperplane Ranking in Simple Genetic Algorithms D. Whitley, K. Mathias, and L. yeatt Department of Computer Science Colorado State University Fort Collins, Colorado 8523 USA whitley,mathiask,pyeatt@cs.colostate.edu

More information

A Weight Based Attack on the CIKS-1 Block Cipher

A Weight Based Attack on the CIKS-1 Block Cipher A Weight Based Attack on the CIKS-1 Block Cipher Brian J. Kidney, Howard M. Heys, Theodore S. Norvell Electrical and Computer Engineering Memorial University of Newfoundland {bkidney, howard, theo}@engr.mun.ca

More information

AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE

AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE Changwu Zhu 1, Guanxiang Yan 2, Zhi Liu 3, Li Gao 1,* 1 Department of Computer Science, Hua Zhong Normal University, Wuhan 430079, China

More information

Two Attacks on Reduced IDEA (Extended Abstract)

Two Attacks on Reduced IDEA (Extended Abstract) 1 Two Attacks on Reduced IDEA (Extended Abstract) Johan Borst 1, Lars R. Knudsen 2, Vincent Rijmen 2 1 T.U. Eindhoven, Discr. Math., P.O. Box 513, NL-5600 MB Eindhoven, borst@win.tue.nl 2 K.U. Leuven,

More information

STATISTICAL CALIBRATION: A BETTER APPROACH TO INTEGRATING SIMULATION AND TESTING IN GROUND VEHICLE SYSTEMS.

STATISTICAL CALIBRATION: A BETTER APPROACH TO INTEGRATING SIMULATION AND TESTING IN GROUND VEHICLE SYSTEMS. 2016 NDIA GROUND VEHICLE SYSTEMS ENGINEERING and TECHNOLOGY SYMPOSIUM Modeling & Simulation, Testing and Validation (MSTV) Technical Session August 2-4, 2016 - Novi, Michigan STATISTICAL CALIBRATION: A

More information

Power Analysis Attacks of Modular Exponentiation in Smartcards

Power Analysis Attacks of Modular Exponentiation in Smartcards Power Analysis Attacks of Modular Exponentiation in Smartcards Thomas S. Messerges 1, Ezzy A. Dabbish 1, Robert H. Sloan 2,3 1 Motorola Labs, Motorola 1301 E. Algonquin Road, Room 2712, Schaumburg, IL

More information

Suppose you have a problem You don t know how to solve it What can you do? Can you use a computer to somehow find a solution for you?

Suppose you have a problem You don t know how to solve it What can you do? Can you use a computer to somehow find a solution for you? Gurjit Randhawa Suppose you have a problem You don t know how to solve it What can you do? Can you use a computer to somehow find a solution for you? This would be nice! Can it be done? A blind generate

More information

Assignment 9 / Cryptography

Assignment 9 / Cryptography Assignment 9 / Cryptography Michael Hauser March 2002 Tutor: Mr. Schmidt Course: M.Sc Distributed Systems Engineering Lecturer: Mr. Owens CONTENTS Contents 1 Introduction 3 2 Simple Ciphers 3 2.1 Vignère

More information

GENETIC ALGORITHM VERSUS PARTICLE SWARM OPTIMIZATION IN N-QUEEN PROBLEM

GENETIC ALGORITHM VERSUS PARTICLE SWARM OPTIMIZATION IN N-QUEEN PROBLEM Journal of Al-Nahrain University Vol.10(2), December, 2007, pp.172-177 Science GENETIC ALGORITHM VERSUS PARTICLE SWARM OPTIMIZATION IN N-QUEEN PROBLEM * Azhar W. Hammad, ** Dr. Ban N. Thannoon Al-Nahrain

More information

Study on GA-based matching method of railway vehicle wheels

Study on GA-based matching method of railway vehicle wheels Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(4):536-542 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Study on GA-based matching method of railway vehicle

More information

International Journal for Research in Applied Science & Engineering Technology (IJRASET) Performance Comparison of Cryptanalysis Techniques over DES

International Journal for Research in Applied Science & Engineering Technology (IJRASET) Performance Comparison of Cryptanalysis Techniques over DES Performance Comparison of Cryptanalysis Techniques over DES Anupam Kumar 1, Aman Kumar 2, Sahil Jain 3, P Kiranmai 4 1,2,3,4 Dept. of Computer Science, MAIT, GGSIP University, Delhi, INDIA Abstract--The

More information

External Encodings Do not Prevent Transient Fault Analysis

External Encodings Do not Prevent Transient Fault Analysis External Encodings Do not Prevent Transient Fault Analysis Christophe Clavier Gemalto, Security Labs CHES 2007 Vienna - September 12, 2007 Christophe Clavier CHES 2007 Vienna September 12, 2007 1 / 20

More information

GENETIC ALGORITHMS, TABU SEARCH AND SIMULATED ANNEALING: A COMPARISON BETWEEN THREE APPROACHES FOR THE CRYPTANALYSIS OF TRANSPOSITION CIPHER

GENETIC ALGORITHMS, TABU SEARCH AND SIMULATED ANNEALING: A COMPARISON BETWEEN THREE APPROACHES FOR THE CRYPTANALYSIS OF TRANSPOSITION CIPHER GENETIC ALGORITHMS, TABU SEARCH AND SIMULATED ANNEALING: A COMPARISON BETWEEN THREE APPROACHES FOR THE CRYPTANALYSIS OF TRANSPOSITION CIPHER POONAM GARG Institute of Management Technology, INDIA E-mail:

More information

Side-Channel Attack against RSA Key Generation Algorithms

Side-Channel Attack against RSA Key Generation Algorithms Side-Channel Attack against RSA Key Generation Algorithms CHES 2014 Aurélie Bauer, Eliane Jaulmes, Victor Lomné, Emmanuel Prouff and Thomas Roche Agence Nationale de la Sécurité des Systèmes d Information

More information

Genetic Algorithm for Dynamic Capacitated Minimum Spanning Tree

Genetic Algorithm for Dynamic Capacitated Minimum Spanning Tree Genetic Algorithm for Dynamic Capacitated Minimum Spanning Tree Rahul Mathur M.Tech (Purs.) BU, AJMER IMRAN KHAN Assistant Professor AIT, Ajmer VIKAS CHOUDHARY Assistant Professor AIT, Ajmer ABSTRACT:-Many

More information

VHDL for RSA Public Key System

VHDL for RSA Public Key System VHDL for RSA Public Key System Rui He, Jie Gu, Liang Zhang, Cheng Li Engineering and Applied Science Memorial University of Newfoundland St. John s, NL, Canada, A1B3X5 E-mail: {ruihe, jiegu, lzhang, licheng}@engr.mun.ca

More information

ISSN: [Keswani* et al., 7(1): January, 2018] Impact Factor: 4.116

ISSN: [Keswani* et al., 7(1): January, 2018] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AUTOMATIC TEST CASE GENERATION FOR PERFORMANCE ENHANCEMENT OF SOFTWARE THROUGH GENETIC ALGORITHM AND RANDOM TESTING Bright Keswani,

More information

Clock Glitch Fault Injection Attacks on an FPGA AES Implementation

Clock Glitch Fault Injection Attacks on an FPGA AES Implementation Journal of Electrotechnology, Electrical Engineering and Management (2017) Vol. 1, Number 1 Clausius Scientific Press, Canada Clock Glitch Fault Injection Attacks on an FPGA AES Implementation Yifei Qiao1,a,

More information

Santa Fe Trail Problem Solution Using Grammatical Evolution

Santa Fe Trail Problem Solution Using Grammatical Evolution 2012 International Conference on Industrial and Intelligent Information (ICIII 2012) IPCSIT vol.31 (2012) (2012) IACSIT Press, Singapore Santa Fe Trail Problem Solution Using Grammatical Evolution Hideyuki

More information

Security Based Heuristic SAX for XML Parsing

Security Based Heuristic SAX for XML Parsing Security Based Heuristic SAX for XML Parsing Wei Wang Department of Automation Tsinghua University, China Beijing, China Abstract - XML based services integrate information resources running on different

More information

A PRACTICAL APPROACH TO POWER TRACE MEASUREMENT FOR DIFFERENTIAL POWER ANALYSIS BASED ATTACKS

A PRACTICAL APPROACH TO POWER TRACE MEASUREMENT FOR DIFFERENTIAL POWER ANALYSIS BASED ATTACKS Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 6 (55) No. 2-2013 A PRACTICAL APPROACH TO POWER TRACE MEASUREMENT FOR DIFFERENTIAL POWER ANALYSIS BASED ATTACKS C.L.

More information

Automatic Selection of GCC Optimization Options Using A Gene Weighted Genetic Algorithm

Automatic Selection of GCC Optimization Options Using A Gene Weighted Genetic Algorithm Automatic Selection of GCC Optimization Options Using A Gene Weighted Genetic Algorithm San-Chih Lin, Chi-Kuang Chang, Nai-Wei Lin National Chung Cheng University Chiayi, Taiwan 621, R.O.C. {lsch94,changck,naiwei}@cs.ccu.edu.tw

More information

RECTIFIED DIFFERENTIAL CRYPTANALYSIS OF 16 ROUND PRESENT

RECTIFIED DIFFERENTIAL CRYPTANALYSIS OF 16 ROUND PRESENT RECTIFIED DIFFERENTIAL CRYPTANALYSIS OF 16 ROUND PRESENT Manoj Kumar 1, Pratibha Yadav, Meena Kumari SAG, DRDO, Metcalfe House, Delhi-110054, India mktalyan@yahoo.com 1 ABSTRACT In this paper, we have

More information

A Real Coded Genetic Algorithm for Data Partitioning and Scheduling in Networks with Arbitrary Processor Release Time

A Real Coded Genetic Algorithm for Data Partitioning and Scheduling in Networks with Arbitrary Processor Release Time A Real Coded Genetic Algorithm for Data Partitioning and Scheduling in Networks with Arbitrary Processor Release Time S. Suresh 1, V. Mani 1, S. N. Omkar 1, and H. J. Kim 2 1 Department of Aerospace Engineering,

More information

Evolutionary Computation Algorithms for Cryptanalysis: A Study

Evolutionary Computation Algorithms for Cryptanalysis: A Study Evolutionary Computation Algorithms for Cryptanalysis: A Study Poonam Garg Information Technology and Management Dept. Institute of Management Technology Ghaziabad, India pgarg@imt.edu Abstract The cryptanalysis

More information

SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation

SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation Roman Novak Jozef Stefan Institute, Jamova 39, 00 Ljubljana, Slovenia, Roman.Novak@ijs.si Abstract. 1 We describe an adaptive chosen-ciphertext

More information

Breaking the Bitstream Decryption of FPGAs

Breaking the Bitstream Decryption of FPGAs Breaking the Bitstream Decryption of FPGAs 05. Sep. 2012 Amir Moradi Embedded Security Group, Ruhr University Bochum, Germany Acknowledgment Christof Paar Markus Kasper Timo Kasper Alessandro Barenghi

More information

Attacking Embedded Systems through Power Analysis

Attacking Embedded Systems through Power Analysis Int. J. Advanced Networking and Applications 811 Attacking Embedded Systems through Power Analysis Dr. Sastry JKR, Department of Information Technology, K L University, Vaddeswaram, Guntur District 522502

More information

A Combined Encryption Compression Scheme Using Chaotic Maps

A Combined Encryption Compression Scheme Using Chaotic Maps BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, No 2 Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0016 A Combined Encryption Compression

More information

Image Classification and Processing using Modified Parallel-ACTIT

Image Classification and Processing using Modified Parallel-ACTIT Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Image Classification and Processing using Modified Parallel-ACTIT Jun Ando and

More information

Genetic Algorithms: Setting Parmeters and Incorporating Constraints OUTLINE OF TOPICS: 1. Setting GA parameters. 2. Constraint Handling (two methods)

Genetic Algorithms: Setting Parmeters and Incorporating Constraints OUTLINE OF TOPICS: 1. Setting GA parameters. 2. Constraint Handling (two methods) Genetic Algorithms: Setting Parmeters and Incorporating Constraints OUTLINE OF TOPICS: 1. Setting GA parameters general guidelines for binary coded GA (some can be extended to real valued GA) estimating

More information

Genetic Algorithm for Dynamic Capacitated Minimum Spanning Tree

Genetic Algorithm for Dynamic Capacitated Minimum Spanning Tree 28 Genetic Algorithm for Dynamic Capacitated Minimum Spanning Tree 1 Tanu Gupta, 2 Anil Kumar 1 Research Scholar, IFTM, University, Moradabad, India. 2 Sr. Lecturer, KIMT, Moradabad, India. Abstract Many

More information

DETERMINING MAXIMUM/MINIMUM VALUES FOR TWO- DIMENTIONAL MATHMATICLE FUNCTIONS USING RANDOM CREOSSOVER TECHNIQUES

DETERMINING MAXIMUM/MINIMUM VALUES FOR TWO- DIMENTIONAL MATHMATICLE FUNCTIONS USING RANDOM CREOSSOVER TECHNIQUES DETERMINING MAXIMUM/MINIMUM VALUES FOR TWO- DIMENTIONAL MATHMATICLE FUNCTIONS USING RANDOM CREOSSOVER TECHNIQUES SHIHADEH ALQRAINY. Department of Software Engineering, Albalqa Applied University. E-mail:

More information

MAXIMUM LIKELIHOOD ESTIMATION USING ACCELERATED GENETIC ALGORITHMS

MAXIMUM LIKELIHOOD ESTIMATION USING ACCELERATED GENETIC ALGORITHMS In: Journal of Applied Statistical Science Volume 18, Number 3, pp. 1 7 ISSN: 1067-5817 c 2011 Nova Science Publishers, Inc. MAXIMUM LIKELIHOOD ESTIMATION USING ACCELERATED GENETIC ALGORITHMS Füsun Akman

More information

ON PRACTICAL RESULTS OF THE DIFFERENTIAL POWER ANALYSIS

ON PRACTICAL RESULTS OF THE DIFFERENTIAL POWER ANALYSIS Journal of ELECTRICAL ENGINEERING, VOL. 63, NO. 2, 212, 125 129 COMMUNICATIONS ON PRACTICAL RESULTS OF THE DIFFERENTIAL POWER ANALYSIS Jakub Breier Marcel Kleja This paper describes practical differential

More information

Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks

Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks Jeong et al. EURASIP Journal on Wireless Communications and Networking 2013, 2013:151 RESEARCH Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks Kitae

More information

Design of a Route Guidance System with Shortest Driving Time Based on Genetic Algorithm

Design of a Route Guidance System with Shortest Driving Time Based on Genetic Algorithm Design of a Route Guidance System with Shortest Driving Time Based on Genetic Algorithm UMIT ATILA 1, ISMAIL RAKIP KARAS 2, CEVDET GOLOGLU 3, BEYZA YAMAN 2, ILHAMI MUHARREM ORAK 2 1 Directorate of Computer

More information

Distributed Optimization of Feature Mining Using Evolutionary Techniques

Distributed Optimization of Feature Mining Using Evolutionary Techniques Distributed Optimization of Feature Mining Using Evolutionary Techniques Karthik Ganesan Pillai University of Dayton Computer Science 300 College Park Dayton, OH 45469-2160 Dale Emery Courte University

More information

Aero-engine PID parameters Optimization based on Adaptive Genetic Algorithm. Yinling Wang, Huacong Li

Aero-engine PID parameters Optimization based on Adaptive Genetic Algorithm. Yinling Wang, Huacong Li International Conference on Applied Science and Engineering Innovation (ASEI 215) Aero-engine PID parameters Optimization based on Adaptive Genetic Algorithm Yinling Wang, Huacong Li School of Power and

More information

D-Optimal Designs. Chapter 888. Introduction. D-Optimal Design Overview

D-Optimal Designs. Chapter 888. Introduction. D-Optimal Design Overview Chapter 888 Introduction This procedure generates D-optimal designs for multi-factor experiments with both quantitative and qualitative factors. The factors can have a mixed number of levels. For example,

More information

Job Shop Scheduling Problem (JSSP) Genetic Algorithms Critical Block and DG distance Neighbourhood Search

Job Shop Scheduling Problem (JSSP) Genetic Algorithms Critical Block and DG distance Neighbourhood Search A JOB-SHOP SCHEDULING PROBLEM (JSSP) USING GENETIC ALGORITHM (GA) Mahanim Omar, Adam Baharum, Yahya Abu Hasan School of Mathematical Sciences, Universiti Sains Malaysia 11800 Penang, Malaysia Tel: (+)

More information

Literature Review On Implementing Binary Knapsack problem

Literature Review On Implementing Binary Knapsack problem Literature Review On Implementing Binary Knapsack problem Ms. Niyati Raj, Prof. Jahnavi Vitthalpura PG student Department of Information Technology, L.D. College of Engineering, Ahmedabad, India Assistant

More information

Research on time optimal trajectory planning of 7-DOF manipulator based on genetic algorithm

Research on time optimal trajectory planning of 7-DOF manipulator based on genetic algorithm Acta Technica 61, No. 4A/2016, 189 200 c 2017 Institute of Thermomechanics CAS, v.v.i. Research on time optimal trajectory planning of 7-DOF manipulator based on genetic algorithm Jianrong Bu 1, Junyan

More information

ANTICIPATORY VERSUS TRADITIONAL GENETIC ALGORITHM

ANTICIPATORY VERSUS TRADITIONAL GENETIC ALGORITHM Anticipatory Versus Traditional Genetic Algorithm ANTICIPATORY VERSUS TRADITIONAL GENETIC ALGORITHM ABSTRACT Irina Mocanu 1 Eugenia Kalisz 2 This paper evaluates the performances of a new type of genetic

More information

March 19, Heuristics for Optimization. Outline. Problem formulation. Genetic algorithms

March 19, Heuristics for Optimization. Outline. Problem formulation. Genetic algorithms Olga Galinina olga.galinina@tut.fi ELT-53656 Network Analysis and Dimensioning II Department of Electronics and Communications Engineering Tampere University of Technology, Tampere, Finland March 19, 2014

More information

Intelligent Risk Identification and Analysis in IT Network Systems

Intelligent Risk Identification and Analysis in IT Network Systems Intelligent Risk Identification and Analysis in IT Network Systems Masoud Mohammadian University of Canberra, Faculty of Information Sciences and Engineering, Canberra, ACT 2616, Australia masoud.mohammadian@canberra.edu.au

More information

Memory Address Side-Channel Analysis on Exponentiation

Memory Address Side-Channel Analysis on Exponentiation Memory Address Side-Channel Analysis on Exponentiation Chien-Ning Chen Physical Analysis & Cryptographic Engineering (PACE) Nanyang Technological University, Singapore chienning@ntu.edu.sg Abstract. Side-channel

More information

Grid Scheduling Strategy using GA (GSSGA)

Grid Scheduling Strategy using GA (GSSGA) F Kurus Malai Selvi et al,int.j.computer Technology & Applications,Vol 3 (5), 8-86 ISSN:2229-693 Grid Scheduling Strategy using GA () Dr.D.I.George Amalarethinam Director-MCA & Associate Professor of Computer

More information

CLOSED LOOP SYSTEM IDENTIFICATION USING GENETIC ALGORITHM

CLOSED LOOP SYSTEM IDENTIFICATION USING GENETIC ALGORITHM CLOSED LOOP SYSTEM IDENTIFICATION USING GENETIC ALGORITHM Lucchesi Alejandro (a), Campomar Guillermo (b), Zanini Aníbal (c) (a,b) Facultad Regional San Nicolás Universidad Tecnológica Nacional (FRSN-UTN),

More information

THE EFFECT OF SEGREGATION IN NON- REPEATED PRISONER'S DILEMMA

THE EFFECT OF SEGREGATION IN NON- REPEATED PRISONER'S DILEMMA THE EFFECT OF SEGREGATION IN NON- REPEATED PRISONER'S DILEMMA Thomas Nordli University of South-Eastern Norway, Norway ABSTRACT This article consolidates the idea that non-random pairing can promote the

More information

New Heuristic Model for Optimal CRC Polynomial

New Heuristic Model for Optimal CRC Polynomial International Journal of Electrical and Computer Engineering (IJECE) Vol. 7, No. 1, February 2017, pp. 521~525 ISSN: 2088-8708, DOI: 10.11591/ijece.v7i1.pp521-525 521 New Heuristic Model for Optimal CRC

More information