Deep learning to evaluate secure rsa implementations

被引:3
|
作者
Carbone M. [1 ]
Conin V. [1 ]
Cornélie M.-A. [2 ]
Dassance F. [3 ]
Dufresne G. [3 ]
Dumas C. [2 ]
Prouff E. [4 ]
Venelli A. [3 ]
机构
[1] SERMA Safety and Security, France
[2] CEA LETI, France
[3] Thales ITSEF, France
[4] ANSSI, France
来源
IACR Transactions on Cryptographic Hardware and Embedded Systems | 2019年 / 2019卷 / 02期
关键词
Deep Learning; RSA; Side-Channel Attacks;
D O I
10.13154/tches.v2019.i2.132-161
中图分类号
学科分类号
摘要
This paper presents the results of several successful profiled side-channel attacks against a secure implementation of the RSA algorithm. The implementation was running on a ARM Core SC 100 completed with a certified EAL4+ arithmetic co-processor. The analyses have been conducted by three experts’ teams, each working on a specific attack path and exploiting information extracted either from the electromagnetic emanation or from the power consumption. A particular attention is paid to the description of all the steps that are usually followed during a security evaluation by a laboratory, including the acquisitions and the observations preprocessing which are practical issues usually put aside in the literature. Remarkably, the profiling portability issue is also taken into account and different device samples are involved for the profiling and testing phases. Among other aspects, this paper shows the high potential of deep learning attacks against secure implementations of RSA and raises the need for dedicated countermeasures. © 2019, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:132 / 161
页数:29
相关论文
共 50 条
  • [1] Deep Learning and Implementations in Banking
    Hassani H.
    Huang X.
    Silva E.
    Ghodsi M.
    Annals of Data Science, 2020, 7 (03) : 433 - 446
  • [2] RSA-OAEP Is Secure under the RSA Assumption
    Eiichiro Fujisaki
    Tatsuaki Okamoto
    David Pointcheval
    Jacques Stern
    Journal of Cryptology, 2004, 17 : 81 - 104
  • [3] RSA-OAEP is secure under the RSA assumption
    Fujisaki, E
    Okamoto, T
    Pointcheval, D
    Stern, J
    JOURNAL OF CRYPTOLOGY, 2004, 17 (02) : 81 - 104
  • [4] Amplitude Demodulation-based EM Analysis of different RSA implementations
    Perin, Guilherme
    Torres, Lionel
    Benoit, Pascal
    Maurine, Philippe
    DESIGN, AUTOMATION & TEST IN EUROPE (DATE 2012), 2012, : 1167 - 1172
  • [5] Public Key Perturbation of Randomized RSA Implementations
    Berzati, Alexandre
    Canovas-Dumas, Cecile
    Goubin, Louis
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 306 - +
  • [6] A Deep Learning Based RSA Strategy for Elastic Optical Networks
    Yu, Jiaoliang
    Cheng, Bokai
    Hang, Cheng
    Hu, Yunfei
    Liu, Shixin
    Wang, Yutong
    Shen, Jianhua
    2019 18TH INTERNATIONAL CONFERENCE ON OPTICAL COMMUNICATIONS AND NETWORKS (ICOCN), 2019,
  • [7] Recovering RSA Private Keys on Implementations with Tampered LSBs
    Patsakis, Constantinos
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 453 - 460
  • [8] Brain Tumor Detection Using Advanced Deep Learning Implementations
    Shrotriya, Lalit
    Agarwal, Govinda
    Mishra, Kushagra
    Mishra, Sashikala
    Bidwe, Ranjeet Vasant
    Kaur, Gagandeep
    TRAITEMENT DU SIGNAL, 2023, 40 (05) : 1869 - 1880
  • [9] Deep learning implementations in mining applications: a compact critical review
    Faris Azhari
    Charlotte C. Sennersten
    Craig A. Lindley
    Ewan Sellers
    Artificial Intelligence Review, 2023, 56 : 14367 - 14402
  • [10] Deep learning implementations in mining applications: a compact critical review
    Azhari, Faris
    Sennersten, Charlotte C.
    Lindley, Craig A.
    Sellers, Ewan
    ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (12) : 14367 - 14402