Deep Learning Side-Channel Collision Attack

نویسندگان

چکیده

With the breakthrough of Deep Neural Networks, many fields benefited from its enormously increasing performance. Although there is an trend to utilize Learning (DL) for Side-Channel Analysis (SCA) attacks, previous works made specific assumptions attack work. Especially concept template attacks widely adapted while not much attention was paid other strategies. In this work, we present a new methodology, that able exploit side-channel collisions in black-box setting. particular, our performed non-profiled setting and requires neither hypothetical power model (or let’s say many-to-one function) nor details about underlying implementation. While existing DL training metrics distinguish correct key, more efficient by can be applied recover multiple key portions, e.g., bytes. order perform on raw traces instead pre-selected samples, further introduce DL-based technique localize input-dependent leakages masked implementations, associated one byte cipher state case AES. We validated approach targeting several publicly available consumption datasets measured implementations protected different masking schemes. As concrete example, demonstrate how successfully bytes ASCAD dataset with only single trained

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Collision-Attack on AES: Combining Side Channel- and Differential-Attack

Recently a new class of collision attacks which was originally suggested by Hans Dobbertin has been introduced. These attacks use side channel analysis to detect internal collisions and are generally not restricted to a particular cryptographic algorithm. As an example, a collision attack against DES was proposed which combines internal collisions with side channel information leakage. It had n...

متن کامل

Near Collision Side Channel Attacks

Side channel collision attacks are a powerful method to exploit side channel leakage. Otherwise than a few exceptions, collision attacks usually combine leakage from distinct points in time, making them inherently bivariate. This work introduces the notion of near collisions to exploit the fact that values depending on the same sub-key can have similar while not identical leakage. We show how s...

متن کامل

An Unsupervised Learning Model to Perform Side Channel Attack

This paper proposes a novel unsupervised learning approach for Power Analysis – a form of side channel attack in Cryptanalysis. Different from existing works that exploit supervised learning framework to solve this problem, our method does not require any labeled pairs, which contains information of the form {X,Y}={key, power-trace}, but is still capable of deciphering the secret key accurately...

متن کامل

Side channel attack: an approach based on machine learning

In cryptography, a side channel attack is any attack based on the analysis of measurements related to the physical implementation of a cryptosystem. Nowadays, the possibility of collecting a large amount of observations paves the way to the adoption of machine learning techniques, i.e. techniques able to extract information and patterns from large datasets. The use of statistical techniques for...

متن کامل

Exploiting Machine Learning Techniques to Perform Side Channel Attack

This paper proposes a novel unsupervised learning approach for Power Analysis – a form of side channel attack in Cryptanalysis. Different from existing works that exploit supervised learning framework to solve this problem, our method does not require any labeled pairs which contains {X,Y}={key, power-trace} information, but is still capable of deciphering the secret key accurately. Besides pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IACR transactions on cryptographic hardware and embedded systems

سال: 2023

ISSN: ['2569-2925']

DOI: https://doi.org/10.46586/tches.v2023.i3.422-444