Deep Learning-Based Side-Channel Analysis Against AES Inner Rounds

被引:0
|
作者
Swaminathan, Sudharshan [1 ]
Chmielewski, Lukasz [2 ,3 ]
Perin, Guilherme [1 ]
Picek, Stjepan [1 ]
机构
[1] Delft Univ Technol, Delft, Netherlands
[2] Radboud Univ Nijmegen, Nijmegen, Netherlands
[3] Riscure, Delft, Netherlands
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022 | 2022年 / 13285卷
关键词
POWER ANALYSIS;
D O I
10.1007/978-3-031-16815-4_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel attacks (SCA) focus on vulnerabilities caused by insecure implementations and exploit them to deduce useful information about the data being processed or the data itself through leakages obtained from the device. There have been many studies exploiting these leakages, and most of the state-of-the-art attacks have been shown to work on AES implementations. The methodology is usually based on exploiting leakages for the outer rounds, i.e., the first and the last round. In some cases, due to partial countermeasures or the nature of the device itself, it might not be possible to attack the outer rounds. In this case, the attacker needs to resort to attacking the inner rounds. This work provides a generalization for inner round side-channel attacks on AES and experimentally validates it with non-profiled and profiled attacks. We formulate the computation of the hypothesis values of any byte in the intermediate rounds. The more inner the AES round is, the higher is the attack complexity in terms of the number of bits to be guessed for the hypothesis. We discuss the main limitations for obtaining predictions in inner rounds and, in particular, we compare the performance of Correlation Power Analysis (CPA) against deep learning-based profiled side-channel attacks (DL-SCA). We show that because trained deep learning models require fewer traces in the attack phase, they also have fewer complexity limitations to attack inner AES rounds than non-profiled attacks such as CPA. This paper is the first to propose deep learning-based profiled attacks on inner rounds of AES to the best of our knowledge.
引用
收藏
页码:165 / 182
页数:18
相关论文
共 50 条
  • [1] On the Evaluation of Deep Learning-Based Side-Channel Analysis
    Wu, Lichao
    Perin, Guilherme
    Picek, Stjepan
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2022, 2022, 13211 : 49 - 71
  • [2] Label Correlation in Deep Learning-Based Side-Channel Analysis
    Wu, Lichao
    Weissbart, Leo
    Krcek, Marina
    Li, Huimin
    Perin, Guilherme
    Batina, Lejla
    Picek, Stjepan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3849 - 3861
  • [3] Recent advances in deep learning-based side-channel analysis
    Jin, Sunghyun
    Kim, Suhri
    Kim, HeeSeok
    Hong, Seokhie
    ETRI JOURNAL, 2020, 42 (02) : 292 - 304
  • [4] Challenges in Deep Learning-Based Profiled Side-Channel Analysis
    Picek, Stjepan
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2019, 2019, 11947 : 9 - 12
  • [5] SoK: Deep Learning-based Physical Side-channel Analysis
    Picek, Stjepan
    Perin, Guilherme
    Mariot, Luca
    Wu, Lichao
    Batina, Lejla
    ACM COMPUTING SURVEYS, 2023, 55 (11)
  • [6] On the Influence of Optimizers in Deep Learning-Based Side-Channel Analysis
    Perin, Guilherme
    Picek, Stjepan
    SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 615 - 636
  • [7] Effective Deep Learning-based Side-Channel Analyses Against ASCAD
    Liu, Junkai
    Zheng, Shihui
    Gu, Lize
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 514 - 523
  • [8] Deep learning side-channel attack against hardware implementations of AES
    Kubota, Takaya
    Yoshida, Kota
    Shiozaki, Mitsuru
    Fujino, Takeshi
    MICROPROCESSORS AND MICROSYSTEMS, 2021, 87
  • [9] Deep Learning Side-Channel Attack against Hardware Implementations of AES
    Kubota, Takaya
    Yoshida, Kota
    Shiozaki, Mitsuru
    Fujino, Takeshi
    2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 261 - 268
  • [10] Enhancing Portability in Deep Learning-Based Side-Channel Attacks Against Kyber
    Chen, Peng
    Cheng, Chi
    Li, Jinnuo
    Zhu, Tianqing
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024, 2025, 15053 : 151 - 167