A machine learning approach against a masked AES Reaching the limit of side-channel attacks with a learning model

被引:85
|
作者
Lerman, Liran [1 ,2 ]
Bontempi, Gianluca [2 ]
Markowitch, Olivier [1 ]
机构
[1] Univ Libre Bruxelles, Dept Informat, Qual & Secur Informat Syst, Brussels, Belgium
[2] Univ Libre Bruxelles, Dept Informat, Machine Learning Grp, Brussels, Belgium
关键词
Side-channel attack; Masking; Profiled attack; Machine learning; Stochastic attack; Template attack;
D O I
10.1007/s13389-014-0089-3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Side-channel attacks challenge the security of cryptographic devices. Awidespread countermeasure against these attacks is the masking approach. Masking combines sensitive variables with secret random values to reduce its leakage. In 2012, Nassar et al. (DATE, pp 1173-1178. IEEE, 2012) presented a new lightweight (low-cost) boolean masking countermeasure to protect the implementation of the Advanced Encryption Standard (AES) block-cipher. This masking scheme represents the target algorithm of the DPA-Contest V4 (http://www.dpacontest.org/home/,2013). In this paper, we present the first machine learning attack against a specific masking countermeasure (more precisely the low-entropy boolean masking countermeasure of Nassar et al.), using the dataset of the DPAContest V4. We succeeded to extract each targeted byte of the key of the masked AES with 7.8 traces during the attacking phase with a strategy based solely on machine learning models. Finally, we compared our proposal with (1) a stochastic attack, (2) a strategy based on template attack and (3) a multivariate regression attack. We show that an attack based on a machine learning model reduces significantly the number of traces required during the attacking step compared to these profiling attacks when analyzing the same leakage information.
引用
收藏
页码:123 / 139
页数:17
相关论文
共 50 条
  • [21] Climbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel Attacks
    Picek, Stjepan
    Heuser, Annelie
    Jovic, Alan
    Legay, Axel
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2017, 2017, 10239 : 61 - 78
  • [22] Profiling Deep Learning Side-Channel Attacks Using Multi-Label against AES Circuits with RSM Countermeasure
    Fukuda, Yuta
    Yoshida, Kota
    Hashimoto, Hisashi
    Kuroda, Kunihiro
    Fujino, Takeshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2023, E106A (03) : 294 - 305
  • [23] Portability of Deep-Learning Side-Channel Attacks against Software Discrepancies
    Wang, Chenggang
    Ninan, Mabon
    Reilly, Shane
    Ward, Joel
    Hawkins, William
    Wang, Boyang
    Emmert, John M.
    PROCEEDINGS OF THE 16TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2023, 2023, : 227 - 238
  • [24] Side-channel attacks and learning-vector quantization
    Saeedi, Ehsan
    Kong, Yinan
    Hossain, Md. Selim
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (04) : 511 - 518
  • [25] Side-channel attacks and learning-vector quantization
    Saeedi, Ehsan
    Kong, Yinan
    Hossain, Md. Selim
    Frontiers of Information Technology and Electronic Engineering, 2017, 18 (04): : 511 - 518
  • [26] Side-channel attacks and learning-vector quantization
    Ehsan Saeedi
    Yinan Kong
    Md. Selim Hossain
    Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 511 - 518
  • [27] Deep Learning-Based Side-Channel Analysis Against AES Inner Rounds
    Swaminathan, Sudharshan
    Chmielewski, Lukasz
    Perin, Guilherme
    Picek, Stjepan
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022, 2022, 13285 : 165 - 182
  • [28] DES with any reduced masked rounds is not secure against side-channel attacks
    Kim, Jongsung
    Lee, Yuseop
    Lee, Sangjin
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (02) : 347 - 354
  • [29] Secure Quantum-based Adder Design for Protecting Machine Learning Systems Against Side-Channel Attacks
    Ul Ain, Noor
    Ahmadpour, Seyed-Sajad
    Navimipour, Nima Jafari
    Diakina, E.
    Kassa, Sankit R.
    APPLIED SOFT COMPUTING, 2025, 169
  • [30] A Survey of Prototype Side-channel Attacks Based on Machine Learning Algorithms for Cryptographic Chips
    Guo, Dongxin
    Chen, Kaiyan
    Hu, Xiaoyang
    Wei, Yanhai
    Li, Jianlong
    2018 INTERNATIONAL SEMINAR ON COMPUTER SCIENCE AND ENGINEERING TECHNOLOGY (SCSET 2018), 2019, 1176