Uncertainty Analysis in Cryptographic Key Recovery for Machine Learning-Based Power Measurements Attacks

被引:0
作者
Arpaia, Pasquale [1 ,2 ]
Caputo, Francesco [3 ]
Cioffi, Antonella [4 ]
Esposito, Antonio [5 ]
Isgro, Francesco [5 ,6 ]
机构
[1] Univ Napoli Federico II, Dept Elect Engn & Informat Technol DIETI, Augmented Real Hlth Monitoring Lab ARHeMLab, I-80125 Naples, Italy
[2] Univ Napoli Federico II, Ctr Interdipartimentale Ric Management Sanitario, I-80125 Naples, Italy
[3] Univ Napoli Federico II, Dept Elect Engn & Informat Technol DIETI, I-80125 Naples, Italy
[4] STMicroelectronics, I-81025 Marcianise, Italy
[5] Univ Napoli Federico II, Dept Elect Engn & Informat Technol DIETI, I-80125 Naples, Italy
[6] Univ Napoli Federico II, Augmented Real Hlth Monitoring Lab ARHeMLab, I-80125 Naples, Italy
关键词
Uncertainty; Entropy; Side-channel attacks; Power measurement; Power demand; Neurons; Training; Advanced encryption standard (AES); machine learning; Index Terms; masking countermeasure; multilayer perceptron (MLP); power measurements; profiling attacks; side-channel analysis (SCA); template attacks; SIDE-CHANNEL ANALYSIS;
D O I
10.1109/TIM.2023.3284933
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The present work concerns side-channel attacks on cryptographic devices protected with the advanced encryption standard (AES). In this regard, the assessment of guessing entropy (GE) and the related uncertainty is proposed for machine-learning-based attacks based on power measurements. For the first time, the GE was assessed on the entire key while uncertainty was introduced in the field of side-channel attacks, thus allowing a more rigorous vulnerability test for a device. Notably, a state-of-the-art attack relying on a multilayer perceptron is exploited for classifying power traces leaked from physically accessible devices. A public database was exploited for the sake of results' reproducibility. Thanks to cross-validation, the uncertainty associated with retrieving a single key byte can be quantified and then propagated to the entire key by means of the Monte Carlo method. It is thus shown that when exploiting about 4000 attack records (traces), there is a 10% probability to retrieve the secret key as a whole with less than ten attempts. This implies that a full cryptographic key can be discovered on average ten times for every 100 similar devices by a side-channel attack. This poses security threats particularly relevant in an Internet-of-Things scenario and addresses the need for improved vulnerability testing and proper countermeasures.
引用
收藏
页数:8
相关论文
共 38 条
[1]   A review of uncertainty quantification in deep learning: Techniques, applications and challenges [J].
Abdar, Moloud ;
Pourpanah, Farhad ;
Hussain, Sadiq ;
Rezazadegan, Dana ;
Liu, Li ;
Ghavamzadeh, Mohammad ;
Fieguth, Paul ;
Cao, Xiaochun ;
Khosravi, Abbas ;
Acharya, U. Rajendra ;
Makarenkov, Vladimir ;
Nahavandi, Saeid .
INFORMATION FUSION, 2021, 76 :243-297
[2]   A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective [J].
Abdul-Ghani, Hezam Akram ;
Konstantas, Dimitri .
JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2019, 8 (02)
[3]   A Review on Bayesian Deep Learning in Healthcare: Applications and Challenges [J].
Abdullah, Abdullah A. ;
Hassan, Masoud M. ;
Mustafa, Yaseen T. .
IEEE ACCESS, 2022, 10 :36538-36562
[4]   Security in Internet of Things: issues, challenges, taxonomy, and architecture [J].
Adat, Vipindev ;
Gupta, B. B. .
TELECOMMUNICATION SYSTEMS, 2018, 67 (03) :423-441
[5]  
Al Osman H, 2021, IEEE INSTRU MEAS MAG, V24, P23
[6]   Problems of the advanced encryption standard in protecting Internet of Things sensor networks [J].
Arpaia, Pasquale ;
Bonavolonta, Francesco ;
Cioffi, Antonella .
MEASUREMENT, 2020, 161
[7]   Deep learning for side-channel analysis and introduction to ASCAD database [J].
Benadjila, Ryad ;
Prouff, Emmanuel ;
Strullu, Remi ;
Cagli, Eleonora ;
Dumas, Cecile .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) :163-188
[8]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[9]   Deep learning uncertainty and confidence calibration for the five-class polyp classification from colonoscopy [J].
Carneiro, Gustavo ;
Pu, Leonardo Zorron Cheng Tao ;
Singh, Rajvinder ;
Burt, Alastair .
MEDICAL IMAGE ANALYSIS, 2020, 62 (62)
[10]   Research on Side-Channel Analysis Based on Deep Learning with Different Sample Data [J].
Chang, Lipeng ;
Wei, Yuechuan ;
He, Shuiyu ;
Pan, Xiaozhong .
APPLIED SCIENCES-BASEL, 2022, 12 (16)