A machine learning approach against a masked AES Reaching the limit of side-channel attacks with a learning model

被引:85
|
作者
Lerman, Liran [1 ,2 ]
Bontempi, Gianluca [2 ]
Markowitch, Olivier [1 ]
机构
[1] Univ Libre Bruxelles, Dept Informat, Qual & Secur Informat Syst, Brussels, Belgium
[2] Univ Libre Bruxelles, Dept Informat, Machine Learning Grp, Brussels, Belgium
关键词
Side-channel attack; Masking; Profiled attack; Machine learning; Stochastic attack; Template attack;
D O I
10.1007/s13389-014-0089-3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Side-channel attacks challenge the security of cryptographic devices. Awidespread countermeasure against these attacks is the masking approach. Masking combines sensitive variables with secret random values to reduce its leakage. In 2012, Nassar et al. (DATE, pp 1173-1178. IEEE, 2012) presented a new lightweight (low-cost) boolean masking countermeasure to protect the implementation of the Advanced Encryption Standard (AES) block-cipher. This masking scheme represents the target algorithm of the DPA-Contest V4 (http://www.dpacontest.org/home/,2013). In this paper, we present the first machine learning attack against a specific masking countermeasure (more precisely the low-entropy boolean masking countermeasure of Nassar et al.), using the dataset of the DPAContest V4. We succeeded to extract each targeted byte of the key of the masked AES with 7.8 traces during the attacking phase with a strategy based solely on machine learning models. Finally, we compared our proposal with (1) a stochastic attack, (2) a strategy based on template attack and (3) a multivariate regression attack. We show that an attack based on a machine learning model reduces significantly the number of traces required during the attacking step compared to these profiling attacks when analyzing the same leakage information.
引用
收藏
页码:123 / 139
页数:17
相关论文
共 50 条
  • [41] Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES
    Luo, Pei
    Fei, Yunsi
    Zhang, Liwei
    Ding, A. Adam
    2014 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG), 2014,
  • [42] Implementation on MicroBlaze of AES Algorithm to Reveal Fake Keys Against Side-Channel Attacks
    Lumbiarres-Lopez, Ruben
    Lopez-Garcia, Mariano
    Canto-Navarro, Enrique
    2014 IEEE 23RD INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2014, : 1882 - 1887
  • [43] Tandem Deep Learning Side-Channel Attack on FPGA Implementation of AES
    Wang H.
    Dubrova E.
    SN Computer Science, 2021, 2 (5)
  • [44] Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS
    Marzougui, Soundes
    Wisiol, Nils
    Gersch, Patrick
    Kraemer, Juliane
    Seifert, Jean-Pierre
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [45] Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis)
    Lerman, Liran
    Poussier, Romain
    Bontempi, Gianluca
    Markowitch, Olivier
    Standaert, Francois-Xavier
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2015, 2015, 9064 : 20 - 33
  • [46] Machine Learning based Side Channel Selection for Time-Driven Cache Attacks on AES
    Sonmez, Burcu
    Sarikaya, Ahmet Ali
    Bahtiyar, Serif
    2019 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2019, : 564 - 568
  • [47] Multiple-differential side-channel collision attacks on AES
    Bogdanov, Andrey
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2008, PROCEEDINGS, 2008, 5154 : 30 - 44
  • [48] Electromagnetic Waveform Characterization for Side-Channel Attacks on AES Encryption
    Judy, Rachael
    Smith, Andrew
    Wallace, Leslie
    Chen, Xiaowei
    2022 IEEE PHYSICAL ASSURANCE AND INSPECTION OF ELECTRONICS (PAINE), 2022, : 158 - 164
  • [49] Combined Fault and Side-Channel Attacks on the AES Key Schedule
    Dassance, Francois
    Venelli, Alexandre
    2012 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC), 2012, : 63 - 71
  • [50] Preventing the side-channel leakage of masked AES S-Box
    Ghosh, Santosh
    Alam, Monjur
    Kumar, Kundan
    Mukhopadhyay, Debdeep
    Chowdhury, Dipanwita Roy
    ADCOM 2007: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2007, : 15 - +