Deep-Learning based Nonprofiling Side-Channel Attack on Mask leakage-free Environments using Broadcast Operation
نویسندگان
چکیده
With the recent development of artificial intelligence (AI), efforts to apply related technologies various fields are rapidly increasing. In field cryptanalysis, research utilizing deep learning is continuously being published in order keep up with this trend. Side-channel analysis a type cryptanalysis that uses physical information and can be classified into profiling nonprofiling analyses. Nonprofiling attacks using take advantage fact training performed relatively well when right key compared wrong key. Masking countermeasures applied design secure cipher against side-channel analysis. The traditional second-order attack for analyzing masked ciphers used by preprocessing side channel remove mask value. However, has able omit process. Related works proposed so far attempted analyze cipher, but focused only on 1-byte masking itself. reality, grasping time-points, which revealed, difficult from secret area. study, we attempt case combining 2-byte information, not information. We also propose neural network scheme perform more effective attacks. method highlights relative difference between keys. Previous evaluation criteria been lacking. Therefore, herein new metrics easily demonstrate their validity simulation actually collected data. As result experiment, methods based loss metric improved approximately 228.59% dataset 739.46% real binary labeling. And it reduced minimum number analytical traces 78.95% 72.5%, respectively.
منابع مشابه
Side channel attack: an approach based on machine learning
In cryptography, a side channel attack is any attack based on the analysis of measurements related to the physical implementation of a cryptosystem. Nowadays, the possibility of collecting a large amount of observations paves the way to the adoption of machine learning techniques, i.e. techniques able to extract information and patterns from large datasets. The use of statistical techniques for...
متن کاملOperation Scheduling of MGs Based on Deep Reinforcement Learning Algorithm
: In this paper, the operation scheduling of Microgrids (MGs), including Distributed Energy Resources (DERs) and Energy Storage Systems (ESSs), is proposed using a Deep Reinforcement Learning (DRL) based approach. Due to the dynamic characteristic of the problem, it firstly is formulated as a Markov Decision Process (MDP). Next, Deep Deterministic Policy Gradient (DDPG) algorithm is presented t...
متن کاملSide Channel Leakage Analysis
Nearly twenty years ago the discovery of side channel attacks has warned the world that security is more than just a mathematical problem. Serious considerations need to be placed on the implementation and its physical media. Nowadays the ever-growing ubiquitous computing calls for in-pace development of security solutions. Although the physical security has attracted increasing public attentio...
متن کاملHigh-Resolution Side-Channel Attack Using Phase-Based Waveform Matching
This paper describes high-resolution waveform matching based on a Phase-Only Correlation (POC) technique and its application for a side-channel attack. Such attacks, such as Simple Power Analysis (SPA) and Differential Power Analysis (DPA), use a statistical analysis of signal waveforms (e.g., power traces) to reduce noise and to retrieve secret information. However, the waveform data often inc...
متن کاملSide-Channel Leakage Evaluation and Detection Based on Communication Theory
Side-channel attacks (SCAs) have been a realistic serious threat to crypto devices. Therefore, evaluating the SCAs resilience of a crypto device is important and necessary. The SCAs-secure evaluation criteria includes the information theoretic metric and the security metric. The former metric, i.e. mutual information (MI), measures the leakage amount of a crypto device. However, because the rea...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2023
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2023.3309422