Deep learning to evaluate secure rsa implementations

被引:3
|
作者
Carbone M. [1 ]
Conin V. [1 ]
Cornélie M.-A. [2 ]
Dassance F. [3 ]
Dufresne G. [3 ]
Dumas C. [2 ]
Prouff E. [4 ]
Venelli A. [3 ]
机构
[1] SERMA Safety and Security, France
[2] CEA LETI, France
[3] Thales ITSEF, France
[4] ANSSI, France
关键词
Deep Learning; RSA; Side-Channel Attacks;
D O I
10.13154/tches.v2019.i2.132-161
中图分类号
学科分类号
摘要
This paper presents the results of several successful profiled side-channel attacks against a secure implementation of the RSA algorithm. The implementation was running on a ARM Core SC 100 completed with a certified EAL4+ arithmetic co-processor. The analyses have been conducted by three experts’ teams, each working on a specific attack path and exploiting information extracted either from the electromagnetic emanation or from the power consumption. A particular attention is paid to the description of all the steps that are usually followed during a security evaluation by a laboratory, including the acquisitions and the observations preprocessing which are practical issues usually put aside in the literature. Remarkably, the profiling portability issue is also taken into account and different device samples are involved for the profiling and testing phases. Among other aspects, this paper shows the high potential of deep learning attacks against secure implementations of RSA and raises the need for dedicated countermeasures. © 2019, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:132 / 161
页数:29
相关论文
共 50 条
  • [21] ESIMD GPU Implementations of Deep Learning Sparse Matrix Kernels
    Zubair, Mohammad
    Bauinger, Christoph
    EURO-PAR 2024: PARALLEL PROCESSING, PT I, EURO-PAR 2024, 2024, 14801 : 33 - 46
  • [22] Brain Tumor Detection Using Advanced Deep Learning Implementations
    Shrotriya, Lalit
    Agarwal, Govinda
    Mishra, Kushagra
    Mishra, Sashikala
    Bidwe, Ranjeet Vasant
    Kaur, Gagandeep
    TRAITEMENT DU SIGNAL, 2023, 40 (05) : 1869 - 1880
  • [23] Deep learning implementations in mining applications: a compact critical review
    Faris Azhari
    Charlotte C. Sennersten
    Craig A. Lindley
    Ewan Sellers
    Artificial Intelligence Review, 2023, 56 : 14367 - 14402
  • [24] Deep learning implementations in mining applications: a compact critical review
    Azhari, Faris
    Sennersten, Charlotte C.
    Lindley, Craig A.
    Sellers, Ewan
    ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (12) : 14367 - 14402
  • [25] RSA-OAEP is RKA Secure
    Jia, Dingding
    Li, Bao
    Lu, Xianhui
    Liu, Yamin
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 270 - 281
  • [26] MULTIBIOMETRIC SECURE SYSTEM BASED ON DEEP LEARNING
    Talreja, Veeru
    Valenti, Matthew C.
    Nasrabadi, Nasser M.
    2017 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP 2017), 2017, : 298 - 302
  • [27] Secure Mobile Crowdsensing Based on Deep Learning
    Liang Xiao
    Donghua Jiang
    Dongjin Xu
    Wei Su
    Ning An
    Dongming Wang
    中国通信, 2018, 15 (10) : 1 - 11
  • [28] Secure Image Classification Using Deep Learning
    Gururaj, K.
    Ananth, Alaka
    Bhat, Sachin S.
    SMART SENSORS MEASUREMENT AND INSTRUMENTATION, CISCON 2021, 2023, 957 : 513 - 523
  • [29] SPEED: secure, PrivatE, and efficient deep learning
    Arnaud Grivet Sébert
    Rafaël Pinot
    Martin Zuber
    Cédric Gouy-Pailler
    Renaud Sirdey
    Machine Learning, 2021, 110 : 675 - 694
  • [30] Secure Object Detection Based on Deep Learning
    Kim, Keonhyeong
    Jung, Im Young
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2021, 17 (03): : 571 - 585