Convolutional neural network based sidechannel attacks

Authors

  • Tran Ngoc Quy
  • Nguyen Thanh Tung
  • Do Quang Trung
  • Dang Hung Viet

DOI:

https://doi.org/10.54654/isj.v1i15.834

Keywords:

Side-channel attack, Profiled attack, machine learning

Tóm tắt

Abstract— The profiled attack is considered one of the most effective side-channel attacks (SCA) methods used to reveal the secret key and evaluate the security of the cryptographic devices. By considering a classification problem, profiled SCA can be successfully conducted by machine learning techniques, as shown by recent works. However, these studies only provide general principles of the attack. Therefore, this paper presents technical aspects and specific instructions for an attacker when performing a profiled attack on a specific cryptographic device using a popular deep learning technique called convolution neural network. The experimental process and the results of the attack on AES-128 are presented to prove the effectiveness of the attack procedure.

Downloads

Download data is not yet available.

References

Kocher P, Jaffe J, Jun B, "Differential Power Analysis," CRYPTO 1999, LNCS 1666. Springer: Heidelberg, p. 388–397, 1999.

BRIER, E., CLAVIER, C., OLIVIER, F, "Correlation power analysis with a leakage model," in Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, Cambridge (USA), 2004.

Chari S, Rao JR, Rohatgi P, "Template Attacks," CHES 2002, LNCS 2523. Springer: Heidelberg, pp. 13-28, 2002.

A. Heuser and M. Zohner, "Intelligent Machine Homicide Breaking Cryptographic Devices Using Support Vector," in COSADE 2012, Heidelberg, 2012.

Bartkewitz, T., Lemke-Rust, K, "Efficient template attacks based on probabilistic multiclass support vector machines," in Mangard, S. (ed.) Smart Card Research and Advanced Applications:11th International Conference, CARDIS 2012, Graz, Austria, 2012.

Emmanuel Prouff, Remi Strullu, Ryad Benadjila, Eleonora Cagli, and Cecile Dumas, "Study of deep learning techniques for sidechannel analysis and introduction to ascad database," Cryptology ePrint Archive, Report 2018/053, 2018.

https://eprint.iacr.org/2018/053, 2018.

Gabriel Zaid, Lilian Bossuet, Amaury Habrard, and Alexandre Venelli, "Methodology for efficient cnn architectures in profiling attacks," Cryptology ePrint Archive, 2019.

Houssem Maghrebi, Thibault Portigliatti, and Emmanuel Prouff, "Breaking cryptographic implementations using deep learning techniques," in In Claude Carlet, M. Anwar Hasan, and Vishal Saraswat, editors, Security, Privacy, and Applied Cryptography Engineering, Springer International Publishing. ISBN 978-3-319-49445-6, 2016, pp. 3-26.

Cagli E., Dumas C., Prouff E, "onvolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures," in Fischer W., Homma N. (eds) Cryptographic Hardware and Embedded Systems – CHES 2017, Lecture Notes in Computer Science, vol 10529. Springer, Cham, 2017.

Coron, J. ,Kizhvatov, I., "An Efficient Method for Random Delay Generation in Embedded Software," in CHES 2009, 2009.

Tran, N.Q., Nguyen, H.Q., "Efficient cnn-based profiled side-channel attacks," Journal of Computer Science and Cybernetics, vol. 37, no.1, pp. 1-22, 2021.

Standaert FX., Malkin T.G., Yung M., "A Unified Framework for the Analysis of SideChannel Key Recovery Attacks," in In: Joux A. (eds) Advances in Cryptology - EUROCRYPT 2009. EUROCRYPT 2009. Lecture Notes in Computer Science, vol 5479, Springer, Berlin, Heidelberg, 2009.

Benadjila, R., Prouff, E., Strullu, R., Cagli, E., Dumas, C, "Deep learning for side-channel analysis and introduction to ASCAD database," J. Cryptographic Engineering, vol. 10, no. 2, pp. 163-188, 2020.

Downloads

Abstract views: 212 / PDF downloads: 97

Published

2022-06-08

How to Cite

Quy, T. N., Tung, N. T., Trung, D. Q., & Viet, D. H. (2022). Convolutional neural network based sidechannel attacks. Journal of Science and Technology on Information Security, 1(15), 26-37. https://doi.org/10.54654/isj.v1i15.834

Issue

Section

Papers