Ph.D. Proposal Oral Exam -Anupam Golder

*********************************
There is now a CONTENT FREEZE for Mercury while we switch to a new platform. It began on Friday, March 10 at 6pm and will end on Wednesday, March 15 at noon. No new content can be created during this time, but all material in the system as of the beginning of the freeze will be migrated to the new platform, including users and groups. Functionally the new site is identical to the old one. webteam@gatech.edu
*********************************

Event Details
  • Date/Time:
    • Tuesday May 10, 2022
      10:00 am - 11:30 am
  • Location: https://teams.microsoft.com/l/meetup-join/19%3ameeting_Y2FmN2M5NTAtZWJhNy00ZTk4LWE1YTctOTkxZDEwZGI1MGY5%40thread.v2/0?context=%7b%22Tid%22%3a%22482198bb-ae7b-4b25-8b7a-6d7f32faa083%22%2c%22Oid%22%3a%2246024958-7610-4d42-89d0-f7372a7a2f98%22%7d
  • Phone:
  • URL:
  • Email:
  • Fee(s):
    N/A
  • Extras:
Contact
No contact information submitted.
Summaries

Summary Sentence: Physical Side-Channel Vulnerability Assessment of Traditional and Post-Quantum Cryptographic Schemes

Full Summary: No summary paragraph submitted.

Title: Physical Side-Channel Vulnerability Assessment of Traditional and Post-Quantum Cryptographic Schemes

Committee: 

Dr. Arijit Raychowdhury, Advisor

Dr. Justin Romberg, Chair

Dr. Suman Datta

Abstract: 

The objective of the proposed research is to better analyze physical side-channel vulnerabilities, with a specific focus on power and electromagnetic (EM) side-channels of the software and hardware implementations of traditional and Post-Quantum Cryptographic (PQC) schemes. While performing side-channel analysis (SCA) of such implementations, the recent body of works focused on proposing better Neural Network (NN) models to achieve higher accuracy at recovering the secret information (i.e., key or message), which is why, portability (profiling and attacking different devices running the same implementation) and interpretability (how the leakages are learned) issues of the NN models were largely overlooked. In the first part of the proposal, we demonstrate how this portability issue manifests itself in the NN-based power/EM SCA on a software implementation of Advanced Encryption Standard (AES)-128, and we propose an efficient cross-device attack using Multi-Device Training and Principal Component Analysis (PCA)-based pre-processing of traces under practical settings, as well as show how we can mitigate the effect of location-dependent Signal-to-Noise Ratio (SNR) of EM traces by automated probe positioning. In the second part of this proposal,  interpretability of NN models used in SCA is investigated to gain insight into which trace samples contribute the most to the classification decision, by validating the relevance scores of features (i.e., points or samples) derived from the NN models using gradient-based post-hoc explanation methods to the ones obtained by traditional Points-of-Interest (PoI) selection methods. In the last part of the proposal, we present preliminary studies conducted on a software implementation of a PQC Public Key Encryption (PKE)/Key Encapsulation Mechanism (KEM) scheme, namely, SABER, using correlation analysis and Test-Vector Leakage Assessment (TVLA) techniques, as well as, an ASIC design of a common compute block used in many Lattice-based PQC schemes and Fully Homomorphic Encryption (FHE) schemes, namely, Number Theoretic Transform (NTT) in a 65-nm technology. We propose to utilize the aforementioned techniques to perform SCA on implementations of these schemes and apply interpretability of NN models to the case of portability issue and novel vulnerability identification.

Additional Information

In Campus Calendar
No
Groups

ECE Ph.D. Proposal Oral Exams

Invited Audience
Public
Categories
Other/Miscellaneous
Keywords
Ph.D. proposal, graduate students
Status
  • Created By: Tasha Torrence
  • Workflow Status: Published
  • Created On: May 6, 2022 - 1:56pm
  • Last Updated: May 6, 2022 - 1:58pm