Adaptive Chosen-Plaintext Deep-Learning-Based Side-Channel Analysis

被引:0
|
作者
Li, Yanbin [1 ,2 ,3 ]
Huang, Yuxin [4 ]
Guo, Yikang [4 ]
Ge, Chunpeng [1 ]
Kong, Fanyu [1 ]
Ren, Yongjun [5 ]
机构
[1] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Henan Key Lab Network Cryptog Technol, Zhengzhou 450000, Peoples R China
[4] Nanjing Agr Univ, Coll Artificial Intelligence, Nanjing 210095, Peoples R China
[5] Nanjing Univ Informat Sci & Technol, Sch Comp, Nanjing 210044, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2025年 / 12卷 / 01期
基金
中国国家自然科学基金;
关键词
Internet of Things; Cryptography; Analytical models; Sensitivity analysis; Entropy; Deep learning; Adaptation models; Chosen-plaintext (CP); deep learning; Internet of Things (IoT); side-channel analysis; POWER ANALYSIS;
D O I
10.1109/JIOT.2024.3460802
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Profiled side-channel analysis presents a significant risk to embedded devices in Internet of Things (IoT). Typically, a single trace is insufficient to successfully key recovery in practical scenarios. It still requires several traces based on Bayes' posterior probability. In this article, we introduce a chosen-plaintext (CP) strategy into the deep learning-based profiled attacks to improve the attack efficiency. First, we present a general strategy to profile the leakage model by exploiting the sensitivity analysis and clustering analysis. The leakage model derived from deep neural network is to characterize the leakage of the target algorithm. Second, we propose an adaptive CP method in the deep learning-based attack, transforming the conditional probability distribution of the leakage into the entropy of the key candidates under the profiled leakage model. Finally, we evaluate the efficiency of the attack by practical measurements. The results demonstrate that the proposed method requires fewer traces to retrieve the key of AES on devices of different types, e.g., Smartcard, FPGA, and ARM. Moreover, our attack improves the attack efficiency on masked implementations.
引用
收藏
页码:174 / 185
页数:12
相关论文
共 50 条
  • [21] Learning-based chosen-plaintext attack on diffractive-imaging-based encryption scheme
    Qin, Yi
    Wan, Yuhong
    Gong, Qiong
    OPTICS AND LASERS IN ENGINEERING, 2020, 127 (127)
  • [22] A comprehensive study of deep learning for side-channel analysis
    Masure L.
    Dumas C.
    Prouff E.
    2020, Ruhr-University of Bochum (2020): : 348 - 375
  • [23] Practical Approaches Toward Deep-Learning-Based Cross-Device Power Side-Channel Attack
    Golder, Anupam
    Das, Debayan
    Danial, Josef
    Ghosh, Santosh
    Sen, Shreyas
    Raychowdhury, Arijit
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2019, 27 (12) : 2720 - 2733
  • [24] A challenging but. feasible blockwise-adaptive chosen-plaintext attack on SSL
    Bard, Gregory V.
    SECRYPT 2006: Proceedings of the International Conference on Security and Cryptography, 2006, : 99 - 109
  • [25] Research on Side-Channel Analysis Based on Deep Learning with Different Sample Data
    Chang, Lipeng
    Wei, Yuechuan
    He, Shuiyu
    Pan, Xiaozhong
    APPLIED SCIENCES-BASEL, 2022, 12 (16):
  • [26] A Comparison of Weight Initializers in Deep Learning-Based Side-Channel Analysis
    Li, Huimin
    Krcek, Marina
    Perin, Guilherme
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 126 - 143
  • [27] Deep learning for side-channel analysis and introduction to ASCAD database
    Ryad Benadjila
    Emmanuel Prouff
    Rémi Strullu
    Eleonora Cagli
    Cécile Dumas
    Journal of Cryptographic Engineering, 2020, 10 : 163 - 188
  • [28] Deep learning for side-channel analysis and introduction to ASCAD database
    Benadjila, Ryad
    Prouff, Emmanuel
    Strullu, Remi
    Cagli, Eleonora
    Dumas, Cecile
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) : 163 - 188
  • [29] Multilabel Deep Learning-Based Side-Channel Attack
    Zhang, Libang
    Xing, Xinpeng
    Fan, Junfeng
    Wang, Zongyue
    Wang, Suying
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 40 (06) : 1207 - 1216
  • [30] Fault-Injection Based Chosen-Plaintext Attacks on Multicycle AES Implementations
    Zhong, Yadi
    Guin, Ujjwal
    PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022, 2022, : 443 - 448