Deep Learning Side-Channel Collision Attack
نویسندگان
چکیده
With the breakthrough of Deep Neural Networks, many fields benefited from its enormously increasing performance. Although there is an trend to utilize Learning (DL) for Side-Channel Analysis (SCA) attacks, previous works made specific assumptions attack work. Especially concept template attacks widely adapted while not much attention was paid other strategies. In this work, we present a new methodology, that able exploit side-channel collisions in black-box setting. particular, our performed non-profiled setting and requires neither hypothetical power model (or let’s say many-to-one function) nor details about underlying implementation. While existing DL training metrics distinguish correct key, more efficient by can be applied recover multiple key portions, e.g., bytes. order perform on raw traces instead pre-selected samples, further introduce DL-based technique localize input-dependent leakages masked implementations, associated one byte cipher state case AES. We validated approach targeting several publicly available consumption datasets measured implementations protected different masking schemes. As concrete example, demonstrate how successfully bytes ASCAD dataset with only single trained
منابع مشابه
A Collision-Attack on AES: Combining Side Channel- and Differential-Attack
Recently a new class of collision attacks which was originally suggested by Hans Dobbertin has been introduced. These attacks use side channel analysis to detect internal collisions and are generally not restricted to a particular cryptographic algorithm. As an example, a collision attack against DES was proposed which combines internal collisions with side channel information leakage. It had n...
متن کاملNear Collision Side Channel Attacks
Side channel collision attacks are a powerful method to exploit side channel leakage. Otherwise than a few exceptions, collision attacks usually combine leakage from distinct points in time, making them inherently bivariate. This work introduces the notion of near collisions to exploit the fact that values depending on the same sub-key can have similar while not identical leakage. We show how s...
متن کاملAn Unsupervised Learning Model to Perform Side Channel Attack
This paper proposes a novel unsupervised learning approach for Power Analysis – a form of side channel attack in Cryptanalysis. Different from existing works that exploit supervised learning framework to solve this problem, our method does not require any labeled pairs, which contains information of the form {X,Y}={key, power-trace}, but is still capable of deciphering the secret key accurately...
متن کاملSide channel attack: an approach based on machine learning
In cryptography, a side channel attack is any attack based on the analysis of measurements related to the physical implementation of a cryptosystem. Nowadays, the possibility of collecting a large amount of observations paves the way to the adoption of machine learning techniques, i.e. techniques able to extract information and patterns from large datasets. The use of statistical techniques for...
متن کاملExploiting Machine Learning Techniques to Perform Side Channel Attack
This paper proposes a novel unsupervised learning approach for Power Analysis – a form of side channel attack in Cryptanalysis. Different from existing works that exploit supervised learning framework to solve this problem, our method does not require any labeled pairs which contains {X,Y}={key, power-trace} information, but is still capable of deciphering the secret key accurately. Besides pro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IACR transactions on cryptographic hardware and embedded systems
سال: 2023
ISSN: ['2569-2925']
DOI: https://doi.org/10.46586/tches.v2023.i3.422-444