CA-SCA: Non-Profiled Deep Learning-Based Side-Channel Attacks by Using Cluster Analysis

被引:0
|
作者
Fukuda, Yuta [1 ]
Yoshida, Kota [2 ]
Fujino, Takeshi [2 ]
机构
[1] Ritsumeikan Univ, Grad Sch Sci & Technol, Kusatsu 5258577, Japan
[2] Ritsumeikan Univ, Dept Sci & Engn, Kusatsu 5258577, Japan
关键词
side-channel attacks; deep-learning; cluster analysis;
D O I
10.1587/transfun.2024CIP0014
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Differential deep learning analysis (DDLA) was proposed as a side-channel attack (SCA) with deep learning techniques in non-profiled scenarios at TCHES 2019. In the proposed DDLA, the adversary sets the LSB or MSB of the intermediate value in the encryption process assumed for the key candidates as the ground-truth label and trains a deep neural network (DNN) with power traces as an input. The adversary also observes metrics such as loss and accuracy during DNN training and estimates that the key corresponding to the best-fitting DNN is correct. One of the disadvantages of DDLA is the heavy computation time for the DNN models because the number of required models is the as same as the number of key candidates, which is 256 in the case of AES. Therefore 4096 DNNs are required for revealing keys of 16 bytes. Furthermore, the DNN models have to be trained again if the adversary changes a ground-truth label function from LSB to other labels such as MSB or HW. We propose a new deep-learning-based SCA in a non-profiled scenario to solve these problems. Our core idea is to extract feature of the leakage waveform using DNN. The adversary reveals the correct keys by conducting cluster analysis using the feature vectors extracted from power traces using DNN. We named this method as CA-SCA (cluster-analysis-based side-channel attacks), it is advantageous that only one DNN needs to be trained to reveal all key bytes. In addition, once the DNN is trained, multiple label functions can be tested without the additional cost of training DNNs. We provide four case studies of attacking against AES, including two software implementations and two hardware implementations. Our attacks against software implementations provide methods using a concatenated dataset that efficiently train the DNN. Also, our attack on the hardware implementation introduces multitask learning to exploit the Hamming distance leakage model. The results show that the proposed method requires fewer waveforms to reveal all key bytes than DDLA owing to the efficient learning performance on the above methods. Comparing the computation time to process the same number of waveforms, the proposed method requires only about 1/75 and 1/25 of the time when attacking software and hardware implementations, respectively, due to the significant reduction in the number of training models.
引用
收藏
页码:227 / 241
页数:15
相关论文
共 50 条
  • [21] Side-channel analysis attacks based on deep learning network
    Yu OU
    Lang LI
    Frontiers of Computer Science, 2022, 16 (02) : 37 - 47
  • [22] Side-channel analysis attacks based on deep learning network
    Yu Ou
    Lang Li
    Frontiers of Computer Science, 2022, 16
  • [23] Side-channel analysis attacks based on deep learning network
    Ou, Yu
    Li, Lang
    FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (02)
  • [24] Deep Learning assisted Cross-Family Profiled Side-Channel Attacks using Transfer Learning
    Thapar, Dhruv
    Alam, Manaar
    Mukhopadhyay, Debdeep
    PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021), 2021, : 178 - 185
  • [25] Multi-Bit DDLA: Non-Profiled Deep Learning Side-Channel Attacks Using Multi-Bit Label against Hardware-Implemented AES
    Fukuda, Yuta
    Yoshida, Kota
    Fujino, Takeshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2025, E108A (03) : 215 - 226
  • [26] Enhancing Portability in Deep Learning-Based Side-Channel Attacks Against Kyber
    Chen, Peng
    Cheng, Chi
    Li, Jinnuo
    Zhu, Tianqing
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024, 2025, 15053 : 151 - 167
  • [27] Label Correlation in Deep Learning-Based Side-Channel Analysis
    Wu, Lichao
    Weissbart, Leo
    Krcek, Marina
    Li, Huimin
    Perin, Guilherme
    Batina, Lejla
    Picek, Stjepan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3849 - 3861
  • [28] Recent advances in deep learning-based side-channel analysis
    Jin, Sunghyun
    Kim, Suhri
    Kim, HeeSeok
    Hong, Seokhie
    ETRI JOURNAL, 2020, 42 (02) : 292 - 304
  • [29] SoK: Deep Learning-based Physical Side-channel Analysis
    Picek, Stjepan
    Perin, Guilherme
    Mariot, Luca
    Wu, Lichao
    Batina, Lejla
    ACM COMPUTING SURVEYS, 2023, 55 (11)
  • [30] On the Influence of Optimizers in Deep Learning-Based Side-Channel Analysis
    Perin, Guilherme
    Picek, Stjepan
    SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 615 - 636