Non-Profiled Deep Learning-Based Side-Channel Analysis with Only One Network Training

نویسندگان

چکیده

We propose efficient protocols for non-profiled deep learning-based side-channel analysis (DL-SCA). While the existing protocol, proposed by Timon in 2019, requires computational resources training as many neural networks number of key candidates, our protocol only one network, which can be transformed into a network associated with each candidate. For instance, case AES, complexity is 1/256 that protocol. In this study, we describe idea and formulate it two depending on metrics used. numerically examine them implementing architectures, multilayer perceptron convolutional network. Using publicly available open data (ASCAD), show both efficiently work expected. also clarify trained Timon’s original case, recycled an attack against same device different materials. Non-profiled DL-SCAs are superior to profiled ones they require no reference profiling before analyzing target device. This property holds proposal well.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Profiled Model Based Power Simulator for Side Channel Evaluation

An embedded cryptographic device performs operation on sensitive data and as such, is vulnerable to side-channel attacks. This forces smart-card manufacturers to carefully consider development of security mechanisms. To accelerate this procedure, the use of power and electromagnetic simulator can be relevant and saves non negligible time. Based on a high level simulator, we propose to use profi...

متن کامل

How to Compare Profiled Side-Channel Attacks?

Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this scenario, an adversary first uses a device under his control in order to build a good leakage model. Then, he takes advantage of this leakage model to exploit the actual leakages of a similar target device and perform ...

متن کامل

Non-Asymptotic Analysis of Relational Learning with One Network

This theoretical paper is concerned with a rigorous non-asymptotic analysis of relational learning applied to a single network. Under suitable and intuitive conditions on features and clique dependencies over the network, we present the first probably approximately correct (PAC) bound for maximum likelihood estimation (MLE). To our best knowledge, this is the first sample complexity result of t...

متن کامل

Towards Leakage Exploitation Optimality in Profiled Side-Channel Attacks

Template Attack is widely accepted to be one of the most powerful side-channel attacks, because it is usually assumed that one has a full knowledge of targeted crypto devices and thus be well capable of characterizing the side-channel leakages. However, the question of whether Template Attack is really optimal in terms of leakage exploitation rate is still unclear. In this paper, we present a n...

متن کامل

Audio-only Bird Species Automated Identification Method with Limited Training Data Based on Multi-Channel Deep Convolutional Neural Networks

XIE Jiang-jian DING Chang-qing; LI Wen-bin; CAI Cheng-hao (1 School of Technology,Beijing Forestry University, Beijing, 100083, P. R. China. 2 School of Nature Conservation,Beijing Forestry University, Beijing, 100083, P. R. China.) Abstract 1. Deep convolutional neural networks (DCNN) have achieved breakthrough performance on bird species identification tasks based on spectrogram features, but...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2023

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2023.3301178