Neural Network Based Attack on a Masked Implementation of AES

被引:0
作者
Gilmore, Richard [1 ]
Hanley, Neil [1 ]
O'Neill, Maire [1 ]
机构
[1] Queens Univ Belfast, ECIT, Ctr Secure Informat Technol, Belfast BT3 9DT, Antrim, North Ireland
来源
2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST) | 2015年
基金
英国工程与自然科学研究理事会;
关键词
SCA; neural network; AES; machine learning; masking; TEMPLATE ATTACKS; POWER ANALYSIS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Masked implementations of cryptographic algorithms are often used in commercial embedded cryptographic devices to increase their resistance to side channel attacks. In this work we show how neural networks can be used to both identify the mask value, and to subsequently identify the secret key value with a single attack trace with high probability. We propose the use of a pre-processing step using principal component analysis (PCA) to significantly increase the success of the attack. We have developed a classifier that can correctly identify the mask for each trace, hence removing the security provided by that mask and reducing the attack to being equivalent to an attack against an unprotected implementation. The attack is performed on the freely available differential power analysis (DPA) contest data set to allow our work to be easily reproducible. We show that neural networks allow for a robust and efficient classification in the context of side-channel attacks.
引用
收藏
页码:106 / 111
页数:6
相关论文
共 39 条
[1]  
Akkar M.-L., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. Third International Workshop. Proceedings (Lecture Notes in Computer Science Vol.2162), P309
[2]  
[Anonymous], 2013717 CRYPT EPRINT
[3]  
[Anonymous], THESIS
[4]  
[Anonymous], LECT NOTES IN PRESS
[5]  
[Anonymous], CONSTRUCTIVE SIDE CH
[6]  
[Anonymous], 2001, FIPS197 NIST AES
[7]  
[Anonymous], 2000, Pattern Classification
[8]  
Archambeau C, 2006, LECT NOTES COMPUT SC, V4249, P1
[9]  
Bishop CM, 1995, Neural Networks for Pattern Recognition
[10]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29