Deep Learning-Based Power Analysis Attack for Extracting AES Keys on ATmega328P Microcontroller

被引:0
|
作者
Ismail Negabi
Smail Ait El Asri
Samir El Adib
Naoufal Raissouni
机构
[1] University Abdelmalek Essaadi,Remote Sensing Systems and Telecommunications, National School of Applied Sciences of Tetuan
关键词
Side-channel attack; Power analysis attack; Deep learning; Cryptography; Advanced encryption standard;
D O I
暂无
中图分类号
学科分类号
摘要
In recent years, several deep learning (DL) approaches, such as convolutional neural networks (CNN) and recurrent neural networks (RNN), have been utilized to carry out side-channel attacks. These attacks exploit vulnerabilities in cryptographic systems, especially in resource-constrained devices like microcontrollers. By analyzing side-channel measures using DL models, attackers can extract information leaked through physical means, including power consumption, time, heat, sound, and electromagnetic radiation, to uncover the secret keys of cryptographic algorithms. Most of these attacks rely on DL models to extract secrets from cryptographic algorithm implementations. In this article, we present a DL-based power analysis attack (PAA) to extract the advanced encryption standard (AES) keys from the ATmega328P microcontroller. Our approach employs a CNN trained on power consumption traces collected during AES-128 execution on the microcontroller. We explain how DL-based PAA exploit the leakage of information from cryptographic devices to recover the secret keys, and we provide a detailed performance comparison of our method to other methods that target cryptographic devices. Our approach stands out not only in its methodology, but also in its robustness and efficiency in revealing secret keys. In comparison with other state-of-the-art methods, our DL-based PAA, implemented on an ASIC with a 130 nm technology, requires only about 1200 traces to successfully extract all 16 bytes of the AES-128 key. This performance outperforms the next-best method evaluated in this paper by a margin of 100 power consumption traces.
引用
收藏
页码:4197 / 4208
页数:11
相关论文
共 22 条
  • [1] Deep Learning-Based Power Analysis Attack for Extracting AES Keys on ATmega328P Microcontroller
    Negabi, Ismail
    Ait El Asri, Smail
    El Adib, Samir
    Raissouni, Naoufal
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (03) : 4197 - 4208
  • [2] Timing performance of a self-cancelling turn-signal mechanism in motorcycles based on the ATMega328P microcontroller
    Nurbuwat, Adzin Kondo
    Eryandi, Kholid Yusuf
    Estriyanto, Yuyun
    Widiastuti, Indah
    Parnbudi, Nugroho Agung
    3RD INTERNATIONAL CONFERENCE ON INDUSTRIAL, MECHANICAL, ELECTRICAL, AND CHEMICAL ENGINEERING, 2018, 1931
  • [3] Machine learning based BPM/Pulse interval predictor of human being using ATMega328p based development board
    Sharma D.
    Jain R.
    Sharma R.
    Shan B.P.
    Shiney O.J.
    Materials Today: Proceedings, 2023, 80 : 3898 - 3908
  • [4] Bursting mechanism in a memristive Lorenz based system and function projective synchronization in its-fractional-order form: Digital implementation under ATmega328P microcontroller
    Tingue, Marceline Motchongom
    Ndassi, Herman Landry
    Tchamda, Andre Rodrigue
    Kengne, Edwige Raissa Mache
    Tchitnga, Robert
    Tchoffo, Martin
    PHYSICA SCRIPTA, 2021, 96 (12)
  • [5] Review of deep learning-based false data injection attack detection in power systems
    Li, Zhuo
    Xie, Yaobin
    Wu, Qianqiong
    Zhang, Youwei
    Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control, 2024, 52 (19): : 175 - 187
  • [6] A deep learning-based classification scheme for cyber-attack detection in power system
    Ding, Yucheng
    Ma, Kang
    Pu, Tianjiao
    Wang, Xingying
    Li, Ran
    Zhang, Dongxia
    IET ENERGY SYSTEMS INTEGRATION, 2021, 3 (03) : 274 - 284
  • [7] Deep Learning-Based Side-Channel Analysis Against AES Inner Rounds
    Swaminathan, Sudharshan
    Chmielewski, Lukasz
    Perin, Guilherme
    Picek, Stjepan
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022, 2022, 13285 : 165 - 182
  • [8] Deep Learning-Based Cyber Attack Detection in Power Grids with Increasing Renewable Energy Penetration
    Dayarathne, M. A. S. P.
    Jayathilaka, M. S. M.
    Bandara, R. M. V. A.
    Logeeshan, V
    Kumarawadu, S.
    Wanigasekara, C.
    2024 IEEE 5TH ANNUAL WORLD AI IOT CONGRESS, AIIOT 2024, 2024, : 0521 - 0526
  • [9] A Deep Learning-Based Classification Scheme for False Data Injection Attack Detection in Power System
    Ding, Yucheng
    Ma, Kang
    Pu, Tianjiao
    Wang, Xinying
    Li, Ran
    Zhang, Dongxia
    ELECTRONICS, 2021, 10 (12)
  • [10] A Comprehensive Review and Analysis of Deep Learning-Based Medical Image Adversarial Attack and Defense
    Muoka, Gladys W.
    Yi, Ding
    Ukwuoma, Chiagoziem C.
    Mutale, Albert
    Ejiyi, Chukwuebuka J.
    Mzee, Asha Khamis
    Gyarteng, Emmanuel S. A.
    Alqahtani, Ali
    Al-antari, Mugahed A.
    MATHEMATICS, 2023, 11 (20)