Adaptive Chosen-Plaintext Deep-Learning-Based Side-Channel Analysis

被引:0
|
作者
Li, Yanbin [1 ,2 ,3 ]
Huang, Yuxin [4 ]
Guo, Yikang [4 ]
Ge, Chunpeng [1 ]
Kong, Fanyu [1 ]
Ren, Yongjun [5 ]
机构
[1] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Henan Key Lab Network Cryptog Technol, Zhengzhou 450000, Peoples R China
[4] Nanjing Agr Univ, Coll Artificial Intelligence, Nanjing 210095, Peoples R China
[5] Nanjing Univ Informat Sci & Technol, Sch Comp, Nanjing 210044, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2025年 / 12卷 / 01期
基金
中国国家自然科学基金;
关键词
Internet of Things; Cryptography; Analytical models; Sensitivity analysis; Entropy; Deep learning; Adaptation models; Chosen-plaintext (CP); deep learning; Internet of Things (IoT); side-channel analysis; POWER ANALYSIS;
D O I
10.1109/JIOT.2024.3460802
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Profiled side-channel analysis presents a significant risk to embedded devices in Internet of Things (IoT). Typically, a single trace is insufficient to successfully key recovery in practical scenarios. It still requires several traces based on Bayes' posterior probability. In this article, we introduce a chosen-plaintext (CP) strategy into the deep learning-based profiled attacks to improve the attack efficiency. First, we present a general strategy to profile the leakage model by exploiting the sensitivity analysis and clustering analysis. The leakage model derived from deep neural network is to characterize the leakage of the target algorithm. Second, we propose an adaptive CP method in the deep learning-based attack, transforming the conditional probability distribution of the leakage into the entropy of the key candidates under the profiled leakage model. Finally, we evaluate the efficiency of the attack by practical measurements. The results demonstrate that the proposed method requires fewer traces to retrieve the key of AES on devices of different types, e.g., Smartcard, FPGA, and ARM. Moreover, our attack improves the attack efficiency on masked implementations.
引用
收藏
页码:174 / 185
页数:12
相关论文
共 50 条
  • [31] On the security of gyrator transform-based image encryption by chosen-plaintext attack
    Sang, Jun
    Alam, Mohammad. S.
    Cai, Bin
    OPTICAL PATTERN RECOGNITION XXVII, 2016, 9845
  • [32] Chosen-plaintext cryptanalysis of a clipped-neural-network-based chaotic cipher
    Li, CQ
    Li, SJ
    Zhang, D
    Chen, GR
    ADVANCES IN NEURAL NETWORKS - ISNN 2005, PT 2, PROCEEDINGS, 2005, 3497 : 630 - 636
  • [33] Learning-based Side-Channel Analysis on PIPO
    Woo, Ji-Eun
    Han, Jaeseung
    Kim, Yeon-Jae
    Mun, Hye-Won
    Lim, Seonghyuck
    Lee, Tae-Ho
    An, Seong-Hyun
    Kim, Soo-Jin
    Han, Dong-Guk
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2021, 2022, 13218 : 308 - 321
  • [34] Regularizers to the rescue: fighting overfitting in deep learning-based side-channel analysis
    Rezaeezade, Azade
    Batina, Lejla
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2024, 14 (04) : 609 - 629
  • [35] Assessment of Addition-Chain-Based Masked S-Box Using Deep-Learning-Based Side-Channel Attacks
    Li, Huizhong
    Ming, Jingdian
    Zhou, Yongbin
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [36] On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel Analysis
    Hajra, Suvadeep
    Alam, Manaar
    Saha, Sayandeep
    Picek, Stjepan
    Mukhopadhyay, Debdeep
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 514 - 528
  • [37] Deep Learning-Based Side-Channel Analysis Against AES Inner Rounds
    Swaminathan, Sudharshan
    Chmielewski, Lukasz
    Perin, Guilherme
    Picek, Stjepan
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022, 2022, 13285 : 165 - 182
  • [38] Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis
    Perin, Guilherme
    Wu, Lichao
    Picek, Stjepan
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 828 - 861
  • [39] Federated Learning in Side-Channel Analysis
    Wang, Huanyu
    Dubrova, Elena
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2020, 2021, 12593 : 257 - 272
  • [40] Deep Learning Method for Power Side-Channel Analysis on Chip Leakages
    Ahmed, Amjed Abbas
    Salim, Rana Ali
    Hasan, Mohammad Kamrul
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2023, 29 (06) : 50 - 57