Multibyte Electromagnetic Analysis Based on Particle Swarm Optimization Algorithm

被引:4
|
作者
Sun, Shaofei [1 ]
Zhang, Hongxin [1 ]
Cui, Xiaotong [1 ]
Dong, Liang [1 ,2 ]
Khan, Muhammad Saad [3 ]
Fang, Xing [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Elect Engn, Beijing 100876, Peoples R China
[2] Qiqihar Univ, Commun & Elect Engn Inst, Qiqihar 161006, Peoples R China
[3] Bahauddin Zakariya Univ, Dept Elect Engn, Multan 60000, Pakistan
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 02期
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
information security; correlation electromagnetic analysis; particle swarm algorithm; cryptographic algorithm;
D O I
10.3390/app11020839
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
This paper focuses on electromagnetic information security in communication systems. Classical correlation electromagnetic analysis (CEMA) is known as a powerful way to recover the cryptographic algorithm's key. In the classical method, only one byte of the key is used while the other bytes are considered as noise, which not only reduces the efficiency but also is a waste of information. In order to take full advantage of useful information, multiple bytes of the key are used. We transform the key into a multidimensional form, and each byte of the key is considered as a dimension. The problem of the right key searching is transformed into the problem of optimizing correlation coefficients of key candidates. The particle swarm optimization (PSO) algorithm is particularly more suited to solve the optimization problems with high dimension and complex structure. In this paper, we applied the PSO algorithm into CEMA to solve multidimensional problems, and we also add a mutation operator to the optimization algorithm to improve the result. Here, we have proposed a multibyte correlation electromagnetic analysis based on particle swarm optimization. We verified our method on a universal test board that is designed for research and development on hardware security. We implemented the Advanced Encryption Standard (AES) cryptographic algorithm on the test board. Experimental results have shown that our method outperforms the classical method; it achieves approximately 13.72% improvement for the corresponding case.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 50 条
  • [41] Reprint of: On convergence analysis of particle swarm optimization algorithm
    Xu, Gang
    Yu, Guosong
    JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, 2018, 340 : 709 - 717
  • [42] The Analysis of Particle Swarm Optimization Algorithm's Convergence
    Lian, Zhigang
    Zhu, Fan
    Guan, Zailin
    Shao, Xinyu
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 623 - +
  • [43] Marionette posture analysis by particle swarm optimization algorithm
    Okuma, M
    Germain, GM
    MULTIBODY DYNAMICS: MONITORING AND SIMULATION TECHNIQUES - III, 2004, : 51 - 56
  • [44] Blending scheduling based on particle swarm optimization algorithm
    Zhao, Xiaoqiang
    2010 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-5, 2010, : 1192 - 1196
  • [45] New particle swarm optimization algorithm based on similarity
    Liu, Jian-Hua
    Fan, Xiao-Ping
    Qu, Zhi-Hua
    Kongzhi yu Juece/Control and Decision, 2007, 22 (10): : 1155 - 1159
  • [46] Improved VRP based on particle swarm optimization algorithm
    Chen, Zixia
    Xuan, Youshi
    DCABES 2006 PROCEEDINGS, VOLS 1 AND 2, 2006, : 436 - 439
  • [47] Particle swarm optimization algorithm based on escape boundary
    Han, Wenhua
    NATURAL RESOURCES AND SUSTAINABLE DEVELOPMENT, PTS 1-3, 2012, 361-363 : 1426 - 1431
  • [48] A GA and Particle Swarm Optimization Based Hybrid Algorithm
    Nie Ru
    Yue Jianhua
    2008 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-8, 2008, : 1047 - 1050
  • [49] A Particle Swarm Optimization Algorithm Based on Molecule Diffusion
    Liu, Xiaoxiang
    Jiang, Weigang
    Xie, Jianwen
    2009 INTERNATIONAL CONFERENCE ON INDUSTRIAL MECHATRONICS AND AUTOMATION, 2009, : 125 - 128
  • [50] Improved Particle Swarm Optimization Based on Genetic Algorithm
    Dou, Chunhong
    Lin, Jinshan
    SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING: THEORY AND PRACTICE, VOL 2, 2012, 115 : 149 - 153