CA-SCA: Non-Profiled Deep Learning-Based Side-Channel Attacks by Using Cluster Analysis

被引:0
|
作者
Fukuda, Yuta [1 ]
Yoshida, Kota [2 ]
Fujino, Takeshi [2 ]
机构
[1] Ritsumeikan Univ, Grad Sch Sci & Technol, Kusatsu 5258577, Japan
[2] Ritsumeikan Univ, Dept Sci & Engn, Kusatsu 5258577, Japan
关键词
side-channel attacks; deep-learning; cluster analysis;
D O I
10.1587/transfun.2024CIP0014
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Differential deep learning analysis (DDLA) was proposed as a side-channel attack (SCA) with deep learning techniques in non-profiled scenarios at TCHES 2019. In the proposed DDLA, the adversary sets the LSB or MSB of the intermediate value in the encryption process assumed for the key candidates as the ground-truth label and trains a deep neural network (DNN) with power traces as an input. The adversary also observes metrics such as loss and accuracy during DNN training and estimates that the key corresponding to the best-fitting DNN is correct. One of the disadvantages of DDLA is the heavy computation time for the DNN models because the number of required models is the as same as the number of key candidates, which is 256 in the case of AES. Therefore 4096 DNNs are required for revealing keys of 16 bytes. Furthermore, the DNN models have to be trained again if the adversary changes a ground-truth label function from LSB to other labels such as MSB or HW. We propose a new deep-learning-based SCA in a non-profiled scenario to solve these problems. Our core idea is to extract feature of the leakage waveform using DNN. The adversary reveals the correct keys by conducting cluster analysis using the feature vectors extracted from power traces using DNN. We named this method as CA-SCA (cluster-analysis-based side-channel attacks), it is advantageous that only one DNN needs to be trained to reveal all key bytes. In addition, once the DNN is trained, multiple label functions can be tested without the additional cost of training DNNs. We provide four case studies of attacking against AES, including two software implementations and two hardware implementations. Our attacks against software implementations provide methods using a concatenated dataset that efficiently train the DNN. Also, our attack on the hardware implementation introduces multitask learning to exploit the Hamming distance leakage model. The results show that the proposed method requires fewer waveforms to reveal all key bytes than DDLA owing to the efficient learning performance on the above methods. Comparing the computation time to process the same number of waveforms, the proposed method requires only about 1/75 and 1/25 of the time when attacking software and hardware implementations, respectively, due to the significant reduction in the number of training models.
引用
收藏
页码:227 / 241
页数:15
相关论文
共 50 条
  • [1] Non-profiled deep learning-based side-channel attacks with sensitivity analysis
    Timon, Benjamin
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019, 2019 (02): : 107 - 131
  • [2] Optimizing Implementations of Non-Profiled Deep Learning-Based Side-Channel Attacks
    Kwon, Donggeun
    Hong, Seokhie
    Kim, Heeseok
    IEEE ACCESS, 2022, 10 : 5957 - 5967
  • [3] Non-Profiled Deep Learning-Based Side-Channel Preprocessing With Autoencoders
    Kwon, Donggeun
    Kim, Heeseok
    Hong, Seokhie
    IEEE ACCESS, 2021, 9 : 57692 - 57703
  • [4] Incorporating Cluster Analysis of Feature Vectors for Non-profiled Deep-learning-Based Side-Channel Attacks
    Fukuda, Yuta
    Yoshida, Kota
    Fujino, Takeshi
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, PT I, ACNS 2024-AIBLOCK 2024, AIHWS 2024, AIOTS 2024, SCI 2024, AAC 2024, SIMLA 2024, LLE 2024, AND CIMSS 2024, 2024, 14586 : 84 - 101
  • [5] Non-Profiled Deep Learning-Based Side-Channel Analysis With Only One Network Training
    Imafuku, Kentaro
    Kawamura, Shinichi
    Nozaki, Hanae
    Sakamoto, Junichi
    Osuka, Saki
    IEEE ACCESS, 2023, 11 : 83221 - 83231
  • [6] Non-Profiled Side-Channel Attack Based on Deep Learning Using Picture Trace
    Won Y.-S.
    Han D.-G.
    Jap D.
    Bhasin S.
    Park J.-Y.
    IEEE Access, 2021, 9 : 22480 - 22492
  • [7] A Quantitative Analysis of Non-Profiled Side-Channel Attacks Based on Attention Mechanism
    Pu, Kangran
    Dang, Hua
    Kong, Fancong
    Zhang, Jingqi
    Wang, Weijiang
    ELECTRONICS, 2023, 12 (15)
  • [8] On the performance of non-profiled side channel attacks based on deep learning techniques
    Do, Ngoc-Tuan
    Hoang, Van-Phuc
    Doan, Van Sang
    Pham, Cong-Kha
    IET INFORMATION SECURITY, 2023, 17 (03) : 377 - 393
  • [9] Challenges in Deep Learning-Based Profiled Side-Channel Analysis
    Picek, Stjepan
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2019, 2019, 11947 : 9 - 12
  • [10] Enhancing non-profiled side-channel attacks by time-frequency analysis
    Jin, Chengbin
    Zhou, Yongbin
    CYBERSECURITY, 2023, 6 (01)