Deep learning side-channel attack against hardware implementations of AES

被引:31
作者
Kubota, Takaya [1 ]
Yoshida, Kota [2 ]
Shiozaki, Mitsuru [1 ]
Fujino, Takeshi [3 ]
机构
[1] Ritsumeikan Univ, Res Org Sci & Engn, Kusatsu, Japan
[2] Ritsumeikan Univ, Grad Sch Sci & Technol, Kusatsu, Japan
[3] Ritsumeikan Univ, Dept Sci & Engn, Kusatsu, Japan
关键词
Side-channel attack; Deep learning; Convolutional neural network;
D O I
10.1016/j.micpro.2020.103383
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the field of image recognition, machine learning technologies, especially deep learning, have been rapidly advancing alongside the advances of hardware such as GPUs. In image recognition, in general, large numbers of labeled images to be identified are input to a neural network, and repeatedly learning the images enables the neural network to identify objects with high accuracy. A new profiling side-channel attack method, the deep learning side-channel attack (DL-SCA), utilizes the neural network's high identifying ability to unveil a cryptographic module's secret key from side-channel information. In DL-SCAs, the neural network is trained with power waveforms captured from a target cryptographic module, and the trained network extracts the leaky part that depends on the secret. However, at this stage, the main target of investigation has been software implementation, and studies regarding hardware implementation, such as ASIC, are somewhat lacking. In this paper, we first depict deep learning techniques, profiling side-channel attacks, and leak models to clarify the relation between secret and side channels. Next, we investigate the use of DL-SCA against hardware implementations of AES and discuss the problem derived from the Hamming distance model and ShiftRow operation of AES. To solve the problem, we propose a new network training method called "mixed model dataset based on round-round XORed value.'' We prove that our proposal solves the problem and gives the attack capability to neural networks. We also compare the attack performance and characteristics of DL-SCA to conventional analysis methods such as correlation power analysis and conventional template attack. In our experiment, a dedicated ASIC chip for side-channel analysis is utilized and the chip is also equipped with a side-channel countermeasure AES. We show how DL-SCA can recover secret keys against the side-channel countermeasure circuit. Our results demonstrate that DL-SCA can be a more powerful option against side-channel countermeasure implementations than conventional SCAs.
引用
收藏
页数:13
相关论文
共 23 条
[1]  
AIST, 2019, EV ENV SID CHANN ATT
[2]  
Benadjila Ryad, 2018, Report2018/053, V22, P2018
[3]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[4]   Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures Profiling Attacks Without Pre-processing [J].
Cagli, Eleonora ;
Dumas, Cecile ;
Prouff, Emmanuel .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 :45-68
[5]  
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
[6]  
Cui Xiaofan., 2019, 2019 American Control Conference (ACC), P1
[7]  
Gierlichs B, 2006, LECT NOTES COMPUT SC, V4249, P15
[8]  
Hettwer Benjamin, 2019, Selected Areas in Cryptography - SAC 2018. 25th International Conference. Revised Selected Papers: Lecture Notes in Computer Science (LNCS 11349), P479, DOI 10.1007/978-3-030-10970-7_22
[9]   Suggestion of Testing Method for Industrial Level Cyber-Physical System in Complex Environment [J].
Kim, Jiseob ;
Chon, Sunil ;
Park, Jihwan .
2019 IEEE 12TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2019), 2019, :148-152
[10]  
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388