{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:52:40Z","timestamp":1760241160779,"version":"build-2065373602"},"reference-count":34,"publisher":"MDPI AG","issue":"24","license":[{"start":{"date-parts":[[2019,12,15]],"date-time":"2019-12-15T00:00:00Z","timestamp":1576368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571063"],"award-info":[{"award-number":["61571063"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004826","name":"Natural Science Foundation of Beijing Municipality","doi-asserted-by":"publisher","award":["3182028"],"award-info":[{"award-number":["3182028"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Fundamental Research Funds for the Central Universities","award":["2019PTB-001"],"award-info":[{"award-number":["2019PTB-001"]}]},{"name":"BUPT Excellent Ph.D. Students Foundation","award":["CX2019226"],"award-info":[{"award-number":["CX2019226"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Correlation electromagnetic analysis (CEMA) is a method prevalent in side-channel analysis of cryptographic devices. Its success mostly depends on the quality of electromagnetic signals acquired from the devices. In the past, only one byte of the key was analyzed and other bytes were regarded as noise. Apparently, other bytes\u2019 useful information was wasted, which may increase the difficulty of recovering the key. Multi-objective optimization is a good way to solve the problem of a single byte of the key. In this work, we applied multi-objective optimization to correlation electromagnetic analysis taking all bytes of the key into consideration. Combining the advantages of multi-objective optimization and genetic algorithm, we put forward a novel multi-objective electromagnetic analysis based on a genetic algorithm to take full advantage of information when recovering the key. Experiments with an Advanced Encryption Standard (AES) cryptographic algorithm on a Sakura-G board demonstrate the efficiency of our method in practice. The experimental results show that our method reduces the number of traces required in correlation electromagnetic analysis. It achieved approximately 42.72% improvement for the corresponding case compared with CEMA.<\/jats:p>","DOI":"10.3390\/s19245542","type":"journal-article","created":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T05:19:38Z","timestamp":1576473578000},"page":"5542","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Novel Multi-Objective Electromagnetic Analysis Based on Genetic Algorithm"],"prefix":"10.3390","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9222-9424","authenticated-orcid":false,"given":"Shaofei","family":"Sun","sequence":"first","affiliation":[{"name":"School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Hongxin","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Liang","family":"Dong","sequence":"additional","affiliation":[{"name":"School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China"},{"name":"Communication and Electronic Engineering Institute, Qiqihar University, Qiqihar 161006, China"}]},{"given":"Xiaotong","family":"Cui","sequence":"additional","affiliation":[{"name":"School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Weijun","family":"Cheng","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Minzu University of China, Beijing 100081, China"}]},{"given":"Muhammad Saad","family":"Khan","sequence":"additional","affiliation":[{"name":"Electrical Engineering Department, Bahauddin Zakariya University, Multan 60000, Pakistan"}]}],"member":"1968","published-online":{"date-parts":[[2019,12,15]]},"reference":[{"unstructured":"Mangard, S., Oswald, E., and Popp, T. (2007). Power Analysis Attacks: Revealing the Secrets of Smart Cards, Springer.","key":"ref_1"},{"doi-asserted-by":"crossref","unstructured":"Kocher, P.C. (1996, January 18\u201322). Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA.","key":"ref_2","DOI":"10.1007\/3-540-68697-5_9"},{"doi-asserted-by":"crossref","unstructured":"Kocher, P.C., Jaffe, J.M., and Jun, B.C. (1999, January 15\u201319). Differential Power Analysis. Proceedings of the 19th Annual International Cryptology Conference, Santa Barbara, CA, USA.","key":"ref_3","DOI":"10.1007\/3-540-48405-1_25"},{"doi-asserted-by":"crossref","unstructured":"Brier, E., Clavier, C., and Olivier, F. (2004, January 11\u201313). Correlation Power analysis with a leakage model. Proceedings of the Conference on Cryptographic Hardware and Embedded Systems 2004, Cambridge, MA, USA.","key":"ref_4","DOI":"10.1007\/978-3-540-28632-5_2"},{"doi-asserted-by":"crossref","unstructured":"Chari, S., Rao, J.R., and Rohatgi, P. (2002, January 13\u201315). Template Attacks. Proceedings of the Cryptographic Hardware and Embedded Systems 2002, Redwood Shores, CA, USA.","key":"ref_5","DOI":"10.1007\/3-540-36400-5_3"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"490","DOI":"10.1109\/TIFS.2017.2757440","article-title":"Efficient, Portable Template Attacks","volume":"13","author":"Choudary","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Boneh, D., Demillo, R.A., and Lipton, R.J. (1997, January 11\u201315). On the importance of checking cryptographic protocols for faults. Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany.","key":"ref_7","DOI":"10.1007\/3-540-69053-0_4"},{"doi-asserted-by":"crossref","unstructured":"Agrawal, D., Archambeault, B., Rao, J.R., and Rohatgi, P. (2002, January 13\u201315). The EM Side-Channel(s). Proceedings of the Cryptographic Hardware and Embedded Systems 2002, Redwood Shores, CA, USA.","key":"ref_8","DOI":"10.1007\/3-540-36400-5_4"},{"unstructured":"Carlier, V., Chabanne, H., Dottax, E., and Pelletier, H. Electromagnetic Side Channels of an FPGA Implementation of AES. Available online: https:\/\/eprint.iacr.org\/2004\/145.pdf.","key":"ref_9"},{"doi-asserted-by":"crossref","unstructured":"Gandolfi, K., Mourtel, C., and Olivier, F. (2001, January 14\u201316). Electromagnetic Analysis: Concrete Results. Proceedings of the Cryptographic Hardware and Embedded Systems 2001, Paris, France.","key":"ref_10","DOI":"10.1007\/3-540-44709-1_21"},{"doi-asserted-by":"crossref","unstructured":"Ding, G., Chu, J., Yuan, L., and Zhao, Q. (2009, January 16\u201317). Correlation Electromagnetic Analysis for Cryptographic Device. Proceedings of the 2009 Pacific-Asia Conference on Circuits, Communications and Systems, Chengdu, China.","key":"ref_11","DOI":"10.1109\/PACCS.2009.144"},{"doi-asserted-by":"crossref","unstructured":"Kasper, T., Oswald, D., and Paar, C. (2009, January 25\u201327). EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment. Proceedings of the 10th Workshop on Information Security Applications, Busan, Korea.","key":"ref_12","DOI":"10.1007\/978-3-642-10838-9_7"},{"doi-asserted-by":"crossref","unstructured":"Li, Y., Chen, M., and Wang, J. (2016, January 17\u201321). Introduction to side-channel attacks and fault attacks. Proceedings of the Asia-Pacific International Symposium on Electromagnetic Compatibility (APEMC), Shenzhen, China.","key":"ref_13","DOI":"10.1109\/APEMC.2016.7522801"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/s13389-011-0023-x","article-title":"Machine learning in side-channel analysis: A first study","volume":"1","author":"Hospodar","year":"2011","journal-title":"J. Cryptogr. Eng."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1504\/IJACT.2014.062722","article-title":"Power analysis attack: An approach based on machine learning","volume":"3","author":"Lerman","year":"2014","journal-title":"IJACT"},{"doi-asserted-by":"crossref","unstructured":"Sun, S., Zhang, H., and Du, Y. (2017, January 28\u201331). The electromagnetic leakage analysis based on arithmetic operation of FPGA. Proceedings of the 5th International Symposium on Electromagnetic Compatibility, Beijing, China.","key":"ref_16","DOI":"10.1109\/EMC-B.2017.8260472"},{"doi-asserted-by":"crossref","unstructured":"Picek, S., Samiotis, I.P., Kim, J., Heuser, A., Bhasin, S., and Legay, A.J.S. (2018, January 3\u20137). On the Performance of Convolutional Neural Networks for Side-channel Analysis. Proceedings of the International Conference on Security, Privacy, and Applied Cryptography Engineering, Gandhinagar, India.","key":"ref_17","DOI":"10.1007\/978-3-030-05072-6_10"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"3896","DOI":"10.1002\/sec.1308","article-title":"A novel bit scalable leakage model based on genetic algorithm","volume":"8","author":"Zhang","year":"2015","journal-title":"Secur. Commun. Netw."},{"key":"ref_19","first-page":"189","article-title":"An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis","volume":"2019","author":"Ding","year":"2019","journal-title":"IACR Cryptol. Eprint Arch."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1016\/j.jclepro.2018.02.004","article-title":"Efficient multi-objective optimization algorithm for hybrid flow shop scheduling problems with setup energy consumptions","volume":"181","author":"Li","year":"2018","journal-title":"J. Clean. Prod."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1016\/j.eswa.2018.07.013","article-title":"Optimizing multi-objective PSO based feature selection method using a feature elitism mechanism","volume":"113","author":"Amoozegar","year":"2018","journal-title":"Expert Syst. Appl."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.enconman.2017.07.065","article-title":"Research and application of a novel hybrid forecasting system based on multi-objective optimization for wind speed forecasting","volume":"150","author":"Du","year":"2017","journal-title":"Energy Convers. Manag."},{"doi-asserted-by":"crossref","unstructured":"Joan Daemen, V.R. (2002). The Design of Rijndael: AES\u2014The Advanced Encryption Standard, Springer Science and Business Media.","key":"ref_23","DOI":"10.1007\/978-3-662-04722-4_1"},{"key":"ref_24","first-page":"1","article-title":"Announcing the advanced encryption standard (AES)","volume":"197","author":"Standard","year":"2001","journal-title":"Fed. Inf. Process. Stand. Publ."},{"key":"ref_25","first-page":"152","article-title":"Optimal Statistical Power Analysis","volume":"2003","author":"Brier","year":"2003","journal-title":"IACR Cryptol. Eprint Arch."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/2.294849","article-title":"Genetic algorithms: A survey","volume":"27","author":"Srinivas","year":"1994","journal-title":"Computer"},{"unstructured":"Goldberg, D.E. (1989). Genetic Algorithms in Search, Optimization, and Machine Learning, Addison-Wesley Professional.","key":"ref_27"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1016\/j.asoc.2005.09.001","article-title":"A genetic algorithms based multi-objective neural net applied to noisy blast furnace data","volume":"7","author":"Pettersson","year":"2007","journal-title":"Appl. Soft Comput."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"992","DOI":"10.1016\/j.ress.2005.11.018","article-title":"Multi-objective optimization using genetic algorithms: A tutorial","volume":"91","author":"Konak","year":"2006","journal-title":"Reliab. Eng. Syst. Saf."},{"unstructured":"Fonseca, C.M., and Fleming, P.J. (, January June). Genetic Algorithms for Multiobjective Optimization: Formulation Discussion and Generalization. Proceedings of the International Conference on Genetic Algorithms, Urbana-Champaign, IL, USA.","key":"ref_30"},{"unstructured":"(2019, October 16). SAKURA Hardware Security Project. Available online: http:\/\/satoh.cs.uec.ac.jp\/SAKURA\/hardware\/SAKURA-G.html.","key":"ref_31"},{"unstructured":"(2019, October 16). TeSCASE Group. Available online: http:\/\/tescase.coe.neu.edu\/?current_page=POWER_TRACE_LINK.","key":"ref_32"},{"unstructured":"(2019, October 16). Evaluation Environment for Side-Channel Attacks, Available online: https:\/\/www.risec.aist.go.jp\/project\/sasebo\/.","key":"ref_33"},{"unstructured":"(2019, October 16). Side-Channel Attack Standard Evaluation Board (Sasebo): Sasebo-Gii, Available online: http:\/\/www.rcis.aist.go.jp\/special\/SASEBO\/SASEBOGII-en.html.","key":"ref_34"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/24\/5542\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:42:29Z","timestamp":1760190149000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/24\/5542"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,15]]},"references-count":34,"journal-issue":{"issue":"24","published-online":{"date-parts":[[2019,12]]}},"alternative-id":["s19245542"],"URL":"https:\/\/doi.org\/10.3390\/s19245542","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2019,12,15]]}}}