Deep-Learning based Nonprofiling Side-Channel Attack on Mask leakage-free Environments using Broadcast Operation

نویسندگان

چکیده

With the recent development of artificial intelligence (AI), efforts to apply related technologies various fields are rapidly increasing. In field cryptanalysis, research utilizing deep learning is continuously being published in order keep up with this trend. Side-channel analysis a type cryptanalysis that uses physical information and can be classified into profiling nonprofiling analyses. Nonprofiling attacks using take advantage fact training performed relatively well when right key compared wrong key. Masking countermeasures applied design secure cipher against side-channel analysis. The traditional second-order attack for analyzing masked ciphers used by preprocessing side channel remove mask value. However, has able omit process. Related works proposed so far attempted analyze cipher, but focused only on 1-byte masking itself. reality, grasping time-points, which revealed, difficult from secret area. study, we attempt case combining 2-byte information, not information. We also propose neural network scheme perform more effective attacks. method highlights relative difference between keys. Previous evaluation criteria been lacking. Therefore, herein new metrics easily demonstrate their validity simulation actually collected data. As result experiment, methods based loss metric improved approximately 228.59% dataset 739.46% real binary labeling. And it reduced minimum number analytical traces 78.95% 72.5%, respectively.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Side channel attack: an approach based on machine learning

In cryptography, a side channel attack is any attack based on the analysis of measurements related to the physical implementation of a cryptosystem. Nowadays, the possibility of collecting a large amount of observations paves the way to the adoption of machine learning techniques, i.e. techniques able to extract information and patterns from large datasets. The use of statistical techniques for...

متن کامل

Operation Scheduling of MGs Based on Deep Reinforcement Learning Algorithm

: In this paper, the operation scheduling of Microgrids (MGs), including Distributed Energy Resources (DERs) and Energy Storage Systems (ESSs), is proposed using a Deep Reinforcement Learning (DRL) based approach. Due to the dynamic characteristic of the problem, it firstly is formulated as a Markov Decision Process (MDP). Next, Deep Deterministic Policy Gradient (DDPG) algorithm is presented t...

متن کامل

Side Channel Leakage Analysis

Nearly twenty years ago the discovery of side channel attacks has warned the world that security is more than just a mathematical problem. Serious considerations need to be placed on the implementation and its physical media. Nowadays the ever-growing ubiquitous computing calls for in-pace development of security solutions. Although the physical security has attracted increasing public attentio...

متن کامل

High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching

This paper describes high-resolution waveform matching based on a Phase-Only Correlation (POC) technique and its application for a side-channel attack. Such attacks, such as Simple Power Analysis (SPA) and Differential Power Analysis (DPA), use a statistical analysis of signal waveforms (e.g., power traces) to reduce noise and to retrieve secret information. However, the waveform data often inc...

متن کامل

Side-Channel Leakage Evaluation and Detection Based on Communication Theory

Side-channel attacks (SCAs) have been a realistic serious threat to crypto devices. Therefore, evaluating the SCAs resilience of a crypto device is important and necessary. The SCAs-secure evaluation criteria includes the information theoretic metric and the security metric. The former metric, i.e. mutual information (MI), measures the leakage amount of a crypto device. However, because the rea...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2023

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2023.3309422