Revealing Secret Key from Low Success Rate Deep Learning-Based Side Channel Attacks

被引:0
|
作者
Van-Phuc Hoang [1 ]
Ngoc-Tuan Do [1 ,2 ]
Trong-Thuc Hoang [3 ]
Cong-Kha Pham [3 ]
机构
[1] Le Quy Don Tech Univ, Inst Syst Integrat, Hanoi, Vietnam
[2] Telecommun Univ, Nha Trang, Vietnam
[3] Univ Electrocommun, Tokyo, Japan
关键词
Deep learning; Side channel attack; Key rank; metric;
D O I
10.1109/MCSoC60832.2023.00010
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Non-profiled deep learning-based side channel attacks utilize deep neural networks to extract highly accurate sensitive information. These attacks pose a significant threat to the security of cryptographic devices. Unlike profiled attacks, non-profiled attacks do not require prior knowledge of the target device, making them more versatile. Deep learning algorithms enable attackers to learn complex relationships between side channel signals and secret information, enabling the recovery of cryptographic keys, even the common SCA countermeasure deployed. However, non-profiled DLSCA can not reveal the secret key if the correct key's metric is not clearly distinguished from the incorrect candidates. This paper discusses the mentioned issue of non-profiled DLSCA. Then, a new metric based on the inversion of exponential rank (IER) is proposed to enhance the performance of these attacks. The experimental results show that the proposed technique could reveal the secret subkey even if the partial success rate percentage is only 10% in the ASCAD dataset. Furthermore, when utilizing minimally tuned models and IER metric to execute attacks on the CHES-CTF 2018 data, there is a substantial increase in the percentage of correctly revealed bytes, rising from 62.5% to 93.75%.
引用
收藏
页码:9 / 14
页数:6
相关论文
共 50 条
  • [31] Effective Deep Learning-based Side-Channel Analyses Against ASCAD
    Liu, Junkai
    Zheng, Shihui
    Gu, Lize
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 514 - 523
  • [32] CA-SCA: Non-Profiled Deep Learning-Based Side-Channel Attacks by Using Cluster Analysis
    Fukuda, Yuta
    Yoshida, Kota
    Fujino, Takeshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2025, E108A (03) : 227 - 241
  • [33] Deep Learning-Based Channel Estimation
    Soltani, Mehran
    Pourahmadi, Vahid
    Mirzaei, Ali
    Sheikhzadeh, Hamid
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (04) : 652 - 655
  • [34] On Deep Learning-Based Channel Decoding
    Gruber, Tobias
    Cammerer, Sebastian
    Hoydis, Jakob
    ten Brink, Stephan
    2017 51ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2017,
  • [35] On the performance of non-profiled side channel attacks based on deep learning techniques
    Do, Ngoc-Tuan
    Hoang, Van-Phuc
    Doan, Van Sang
    Pham, Cong-Kha
    IET INFORMATION SECURITY, 2023, 17 (03) : 377 - 393
  • [36] Assessment of Common Side Channel Countermeasures With Respect To Deep Learning Based Profiled Attacks
    Maghrebi, Houssem
    31ST INTERNATIONAL CONFERENCE ON MICROELECTRONICS (IEEE ICM 2019), 2019, : 126 - 129
  • [37] A Comparison of Deep Learning Approaches for Power-Based Side-Channel Attacks
    Capoferri, Roberto
    Barenghi, Alessandro
    Breveglieri, Luca
    Izzo, Niccolo
    Pelosi, Gerardo
    SECURE IT SYSTEMS, NORDSEC 2024, 2025, 15396 : 101 - 120
  • [38] Evaluation of Machine Learning-based Detection against Side-Channel Attacks on Autonomous Vehicle
    Wang, Han
    Salehi, Soheil
    Sayadi, Hossein
    Sasan, Avesta
    Mohsenin, Tinoosh
    Manoj, P. D. Sai
    Rafatirad, Setareh
    Homayoun, Houman
    2021 IEEE 3RD INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE CIRCUITS AND SYSTEMS (AICAS), 2021,
  • [39] Side-Channel Attacks Based on Collaborative Learning
    Liu, Biao
    Ding, Zhao
    Pan, Yang
    Li, Jiali
    Feng, Huamin
    DATA SCIENCE, PT 1, 2017, 727 : 549 - 557
  • [40] Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis
    Perin, Guilherme
    Wu, Lichao
    Picek, Stjepan
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 828 - 861