This paper demonstrates a power analysis-based Side-Channel Analysis (SCA) attack on the SNOW-V encryption algorithm, which is a 5G mobile communication security standard candidate. Implemented on an STM32 microcontroller, power traces captured with a ChipWhisperer board were analyzed, with Test Vector Leakage Assessment (TVLA) confirming exploitable leakage. Profiling attacks using Linear Discriminant Analysis (LDA) and Fully Connected Neural Networks (FCN) achieved efficient key recovery, with FCN achieving > 5X lower minimum traces to disclosure (MTD) compared to the state-of-the-art Correlational Power Analysis (CPA) assisted with LDA. The results highlight the vulnerability of SNOW-V to machine learning-based SCA and the need for robust countermeasures.
翻译:本文展示了一种针对SNOW-V加密算法的基于功耗分析的侧信道分析攻击,该算法是5G移动通信安全标准的候选方案。攻击在STM32微控制器上实现,通过ChipWhisperer板卡捕获功耗轨迹并进行分析,测试向量泄漏评估证实了可利用的泄漏存在。采用线性判别分析和全连接神经网络进行的模板攻击实现了高效的密钥恢复,其中全连接神经网络所需的最小泄露轨迹数比当前最先进的结合线性判别分析的相关系数功耗分析降低了五倍以上。研究结果凸显了SNOW-V对基于机器学习的侧信道攻击的脆弱性,以及实施有效防护措施的必要性。