Practical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM

نویسندگان

چکیده

Abstract Deep-learning side-channel attacks, applying deep neural networks to are known that can easily attack some existing countermeasures such as masking and random jitter. While there have been many studies on profiled deep-learning a new approach involves learning non-profiled attacks was proposed in 2018. In our study, we investigate the structure of multi-layer perceptrons points interest for using ANSSI database with countermeasure. The results investigations indicate it is better use simple network model, apply regularization prevent over-fitting, select wide range power traces contain information interest. We also implemented AES-128 software implementation protected Rotating Sboxes Masking countermeasure, which has never attacked by Xmega128 microcontroller carried out against it. Non-profiled successfully recovered all partial keys while conventional analysis could not. showed least significant bit adequate selection successful but best labeling method may vary depending countermeasure algorithm. conducted two experimental analyses clarify learn mask values used One gradient visualization previous studies, other removal traces.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Synthesis of Masking Countermeasures against Side Channel Attacks

We propose a new synthesis method for generating countermeasures for cryptographic software code to mitigate power analysis based side channel attacks. Side channel attacks may arise when computers and microchips leak sensitive information about the software code and data that they process, e.g., through power dissipation or electromagnetic radiation. Such information leaks have been exploited ...

متن کامل

Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks

This paper analyzes the robustness of RSA countermeasures against electromagnetic analysis and collision attacks. The proposed RSA cryptosystem uses residue number systems (RNS) for fast executions of the modular calculi with large numbers. The parallel architecture is protected at arithmetic and algorithmic levels by using the Montgomery Ladder and the Leak Resistant Arithmetic countermeasures...

متن کامل

SMT-Based Verification of Software Countermeasures against Side-Channel Attacks

A common strategy for designing countermeasures against side channel attacks is using randomization techniques to remove the statistical dependency between sensitive data and side-channel emissions. However, this process is both labor intensive and error prone, and currently, there is a lack of automated tools to formally access how secure a countermeasure really is. We propose the first SMT so...

متن کامل

Provably Secure Countermeasures against Side-channel Attacks

Side-channel attacks exploit the fact that the implementations of cryptographic algorithms leak information about the secret key. In power analysis attacks, the observable leakage is the power consumption of the device, which is dependent on the processed data and the performed operations. Masking is a widely used countermeasure to thwart the powerful Differential Power Analysis (DPA) attacks. ...

متن کامل

How to Compare Profiled Side-Channel Attacks?

Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this scenario, an adversary first uses a device under his control in order to build a good leakage model. Then, he takes advantage of this leakage model to exploit the actual leakages of a similar target device and perform ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Cryptographic Engineering

سال: 2023

ISSN: ['2190-8508', '2190-8516']

DOI: https://doi.org/10.1007/s13389-023-00312-6