A machine learning approach against a masked AES Reaching the limit of side-channel attacks with a learning model

被引:85
|
作者
Lerman, Liran [1 ,2 ]
Bontempi, Gianluca [2 ]
Markowitch, Olivier [1 ]
机构
[1] Univ Libre Bruxelles, Dept Informat, Qual & Secur Informat Syst, Brussels, Belgium
[2] Univ Libre Bruxelles, Dept Informat, Machine Learning Grp, Brussels, Belgium
关键词
Side-channel attack; Masking; Profiled attack; Machine learning; Stochastic attack; Template attack;
D O I
10.1007/s13389-014-0089-3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Side-channel attacks challenge the security of cryptographic devices. Awidespread countermeasure against these attacks is the masking approach. Masking combines sensitive variables with secret random values to reduce its leakage. In 2012, Nassar et al. (DATE, pp 1173-1178. IEEE, 2012) presented a new lightweight (low-cost) boolean masking countermeasure to protect the implementation of the Advanced Encryption Standard (AES) block-cipher. This masking scheme represents the target algorithm of the DPA-Contest V4 (http://www.dpacontest.org/home/,2013). In this paper, we present the first machine learning attack against a specific masking countermeasure (more precisely the low-entropy boolean masking countermeasure of Nassar et al.), using the dataset of the DPAContest V4. We succeeded to extract each targeted byte of the key of the masked AES with 7.8 traces during the attacking phase with a strategy based solely on machine learning models. Finally, we compared our proposal with (1) a stochastic attack, (2) a strategy based on template attack and (3) a multivariate regression attack. We show that an attack based on a machine learning model reduces significantly the number of traces required during the attacking step compared to these profiling attacks when analyzing the same leakage information.
引用
收藏
页码:123 / 139
页数:17
相关论文
共 50 条
  • [31] ALScA: A Framework for Using Auxiliary Learning Side-Channel Attacks to Model PUFs
    Liu, Wei
    Zhang, Youwei
    Tang, Yonghe
    Wang, Huanwei
    Wei, Qiang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 804 - 817
  • [32] Tolerance Evaluation Against Deep Learning Side-Channel Attack on AES in Automotive Microcontroller With Uncertain Leakage Model
    Himuro, Masaki
    Kawahara, Naoto
    Amanuma, Yoshiyuki
    Iokibe, Kengo
    Nogami, Yasuyuki
    Toyota, Yoshitaka
    PROCEEDINGS OF THE 2024 IEEE JOINT INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY, SIGNAL & POWER INTEGRITY: EMC JAPAN/ASIAPACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY, EMC JAPAN/APEMC OKINAWA 2024, 2024, : 528 - 531
  • [33] Enhancing Portability in Deep Learning-Based Side-Channel Attacks Against Kyber
    Chen, Peng
    Cheng, Chi
    Li, Jinnuo
    Zhu, Tianqing
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024, 2025, 15053 : 151 - 167
  • [34] Pinpointing the side-channel leakage of masked AES hardware implementations
    Mangard, Stefan
    Schramm, Kai
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 76 - 90
  • [35] Side-channel analysis attacks based on deep learning network
    OU Yu
    LI Lang
    Frontiers of Computer Science, 2022, 16 (02)
  • [36] Side-channel analysis attacks based on deep learning network
    Yu Ou
    Lang Li
    Frontiers of Computer Science, 2022, 16
  • [37] Deep-Learning Side-Channel Attack Against STM32 Implementation of AES
    Hu, Fanliang
    Wang, Huanyu
    Wang, Junnian
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2021), 2021, : 844 - 847
  • [38] Side-channel analysis attacks based on deep learning network
    Ou, Yu
    Li, Lang
    FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (02)
  • [39] Machine learning in side-channel analysis: a first study
    Hospodar, Gabriel
    Gierlichs, Benedikt
    De Mulder, Elke
    Verbauwhede, Ingrid
    Vandewalle, Joos
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (04) : 293 - 302
  • [40] Side-Channel Analysis and Machine Learning: A Practical Perspective
    Picek, Stjepan
    Heuser, Annelie
    Jovic, Alan
    Ludwig, Simone A.
    Guilley, Sylvain
    Jakobovic, Domagoj
    Mentens, Nele
    2017 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2017, : 4095 - 4102