Deep learning to evaluate secure rsa implementations

被引:3
|
作者
Carbone M. [1 ]
Conin V. [1 ]
Cornélie M.-A. [2 ]
Dassance F. [3 ]
Dufresne G. [3 ]
Dumas C. [2 ]
Prouff E. [4 ]
Venelli A. [3 ]
机构
[1] SERMA Safety and Security, France
[2] CEA LETI, France
[3] Thales ITSEF, France
[4] ANSSI, France
关键词
Deep Learning; RSA; Side-Channel Attacks;
D O I
10.13154/tches.v2019.i2.132-161
中图分类号
学科分类号
摘要
This paper presents the results of several successful profiled side-channel attacks against a secure implementation of the RSA algorithm. The implementation was running on a ARM Core SC 100 completed with a certified EAL4+ arithmetic co-processor. The analyses have been conducted by three experts’ teams, each working on a specific attack path and exploiting information extracted either from the electromagnetic emanation or from the power consumption. A particular attention is paid to the description of all the steps that are usually followed during a security evaluation by a laboratory, including the acquisitions and the observations preprocessing which are practical issues usually put aside in the literature. Remarkably, the profiling portability issue is also taken into account and different device samples are involved for the profiling and testing phases. Among other aspects, this paper shows the high potential of deep learning attacks against secure implementations of RSA and raises the need for dedicated countermeasures. © 2019, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:132 / 161
页数:29
相关论文
共 50 条
  • [1] Deep Learning and Implementations in Banking
    Hassani H.
    Huang X.
    Silva E.
    Ghodsi M.
    Annals of Data Science, 2020, 7 (03) : 433 - 446
  • [2] Algorithms for software implementations or RSA
    Selby, A.
    Mitchell, C.
    IEE Proceedings E: Computers and Digital Techniques, 1989, 136 (03): : 166 - 170
  • [3] ALGORITHMS FOR SOFTWARE IMPLEMENTATIONS OF RSA
    SELBY, A
    MITCHELL, C
    IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1989, 136 (03): : 166 - 170
  • [4] A SURVEY OF HARDWARE IMPLEMENTATIONS OF RSA
    BRICKELL, EF
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 368 - 370
  • [5] Security risks in deep learning implementations
    Xiao, Qixue
    Li, Kang
    Zhang, Deyue
    Xu, Weilin
    arXiv, 2017,
  • [6] Security Risks in Deep Learning Implementations
    Xiao, Qixue
    Li, Kang
    Zhang, Deyue
    Xu, Weilin
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 123 - 128
  • [7] Moduli for testing implementations of the RSA cryptosystem
    Walter, CD
    14TH IEEE SYMPOSIUM ON COMPUTER ARITHMETIC, PROCEEDINGS, 1999, : 78 - 85
  • [8] RSA-OAEP Is Secure under the RSA Assumption
    Eiichiro Fujisaki
    Tatsuaki Okamoto
    David Pointcheval
    Jacques Stern
    Journal of Cryptology, 2004, 17 : 81 - 104
  • [9] RSA-OAEP is secure under the RSA assumption
    Fujisaki, E
    Okamoto, T
    Pointcheval, D
    Stern, J
    JOURNAL OF CRYPTOLOGY, 2004, 17 (02) : 81 - 104
  • [10] Public Key Perturbation of Randomized RSA Implementations
    Berzati, Alexandre
    Canovas-Dumas, Cecile
    Goubin, Louis
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 306 - +