CA-SCA: Non-Profiled Deep Learning-Based Side-Channel Attacks by Using Cluster Analysis

被引:0
|
作者
Fukuda, Yuta [1 ]
Yoshida, Kota [2 ]
Fujino, Takeshi [2 ]
机构
[1] Ritsumeikan Univ, Grad Sch Sci & Technol, Kusatsu 5258577, Japan
[2] Ritsumeikan Univ, Dept Sci & Engn, Kusatsu 5258577, Japan
关键词
side-channel attacks; deep-learning; cluster analysis;
D O I
10.1587/transfun.2024CIP0014
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Differential deep learning analysis (DDLA) was proposed as a side-channel attack (SCA) with deep learning techniques in non-profiled scenarios at TCHES 2019. In the proposed DDLA, the adversary sets the LSB or MSB of the intermediate value in the encryption process assumed for the key candidates as the ground-truth label and trains a deep neural network (DNN) with power traces as an input. The adversary also observes metrics such as loss and accuracy during DNN training and estimates that the key corresponding to the best-fitting DNN is correct. One of the disadvantages of DDLA is the heavy computation time for the DNN models because the number of required models is the as same as the number of key candidates, which is 256 in the case of AES. Therefore 4096 DNNs are required for revealing keys of 16 bytes. Furthermore, the DNN models have to be trained again if the adversary changes a ground-truth label function from LSB to other labels such as MSB or HW. We propose a new deep-learning-based SCA in a non-profiled scenario to solve these problems. Our core idea is to extract feature of the leakage waveform using DNN. The adversary reveals the correct keys by conducting cluster analysis using the feature vectors extracted from power traces using DNN. We named this method as CA-SCA (cluster-analysis-based side-channel attacks), it is advantageous that only one DNN needs to be trained to reveal all key bytes. In addition, once the DNN is trained, multiple label functions can be tested without the additional cost of training DNNs. We provide four case studies of attacking against AES, including two software implementations and two hardware implementations. Our attacks against software implementations provide methods using a concatenated dataset that efficiently train the DNN. Also, our attack on the hardware implementation introduces multitask learning to exploit the Hamming distance leakage model. The results show that the proposed method requires fewer waveforms to reveal all key bytes than DDLA owing to the efficient learning performance on the above methods. Comparing the computation time to process the same number of waveforms, the proposed method requires only about 1/75 and 1/25 of the time when attacking software and hardware implementations, respectively, due to the significant reduction in the number of training models.
引用
收藏
页码:227 / 241
页数:15
相关论文
共 50 条
  • [31] Non-Profiled Side-Channel Assisted Fault Attack: A Case Study on DOMREP
    Saha, Sayandeep
    Ravi, Prasanna
    Jap, Dirmanto
    Bhasin, Shivam
    2023 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2023,
  • [32] Practical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM
    Kunihiro Kuroda
    Yuta Fukuda
    Kota Yoshida
    Takeshi Fujino
    Journal of Cryptographic Engineering, 2023, 13 : 427 - 442
  • [33] Practical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM
    Kuroda, Kunihiro
    Fukuda, Yuta
    Yoshida, Kota
    Fujino, Takeshi
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2023, 13 (04) : 427 - 442
  • [34] Design of Convolutional Neural Networks Architecture for Non-Profiled Side-Channel Attack Detection
    Ahmed, Amjed Abbas
    Hasan, Mohammad Kamrul
    Islam, Shayla
    Aman, Azana Hafizah Mohd
    Safie, Nurhizam
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2023, 29 (04) : 76 - 81
  • [35] Multilabel Deep Learning-Based Side-Channel Attack
    Zhang, Libang
    Xing, Xinpeng
    Fan, Junfeng
    Wang, Zongyue
    Wang, Suying
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 40 (06) : 1207 - 1216
  • [36] A Comparison of Weight Initializers in Deep Learning-Based Side-Channel Analysis
    Li, Huimin
    Krcek, Marina
    Perin, Guilherme
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 126 - 143
  • [37] Learning-based Side-Channel Analysis on PIPO
    Woo, Ji-Eun
    Han, Jaeseung
    Kim, Yeon-Jae
    Mun, Hye-Won
    Lim, Seonghyuck
    Lee, Tae-Ho
    An, Seong-Hyun
    Kim, Soo-Jin
    Han, Dong-Guk
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2021, 2022, 13218 : 308 - 321
  • [38] Strength in numbers: Improving generalization with ensembles in machine learning-based profiled side-channel analysis
    Perin G.
    Chmielewski Ł.
    Picek S.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (04): : 337 - 364
  • [39] Online Performance Evaluation of Deep Learning Networks for Profiled Side-Channel Analysis
    Robissout, Damien
    Zaid, Gabriel
    Colombier, Brice
    Bossuet, Lilian
    Habrard, Amaury
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 200 - 218
  • [40] Improving Deep Learning Networks for Profiled Side-channel Analysis Using Performance Improvement Techniques
    Robissout, Damien
    Bossuet, Lilian
    Habrard, Amaury
    Grosso, Vincent
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2021, 17 (03)