Performance Analysis of Deep Learning Based Non-profiled Side Channel Attacks Using Significant Hamming Weight Labeling

Van-Phuc Hoang1, Ngoc-Tuan Do, Van Sang Doan2
1Le Quy Don Technical University, Hanoi, Vietnam
2Faculty of Communications and Radar, Vietnam Naval Academy, Nha Trang, Vietnam

Tóm tắt

The use of deep learning (DL) techniques for side-channel analysis (SCA) has become increasingly popular recently. This paper assesses the application of DL to non-profiled SCA attacks on AES-128 encryption, taking into consideration various challenges, including high-dimensional data, imbalanced classes, and countermeasures. The paper proposes using a multi-layer perceptron (MLP) and a convolutional neural network (CNN) to tackle hiding protection methods, such as noise generation and de-synchronization. The paper also introduces a technique called significant Hamming weight (SHW) labeling and a dataset reconstruction approach to handle imbalanced datasets, resulting in a reduction of 30% in the number of measurements required for training. The experimental results on reconstructed dataset demonstrate improved performance in DL-based SCA compared to binary labeling techniques, especially in the face of hiding countermeasures. This leads to better results for non-profiled attacks on different targets, such as ASCAD and RISC-V microcontrollers.

Tài liệu tham khảo

Hettwer TGB, Gehrer S (2020) Applications of machine learning techniques in side-channel attacks: a survey. J Cryptogr Eng 10:135–162 Timon B (2019) Non-Profiled Deep Learning-based Side-Channel attacks with Sensitivity Analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019(2), 107–131. https://doi.org/10.13154/tches.v2019.i2.107-131 Picek S, Samiotis IP, Kim J, Heuser A, Bhasin S, Legay A (2018) On the performance of convolutional neural networks for side-channel analysis. In: Chattopadhyay A, Rebeiro C, Yarom Y (eds) Security, Privacy, and Applied Cryptography Engineering. Springer International Publishing, Cham, pp 157–176 Alipour A, Papadimitriou A, Beroulle V, Aerabi E, Hély D (2020) On the performance of non-profiled differential deep learning attacks against an aes encryption algorithm protected using a correlated noise generation based hiding countermeasure. In: 2020 Design, Automation Test in Europe Conference Exhibition (DATE). pp 614–617 Won Y-S, Han D-G, Jap D, Bhasin S, Park J-Y (2021) Non-profiled side-channel attack based on deep learning using picture trace. IEEE Access 9:22 480–22 492 Do NT, Hoang VP , Doan VS (2020) Performance analysis of non-profiled side channel attacks based on convolutional neural networks. In: 2020 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). pp 66–69 Bae DBD, Bae JHD, Hwang JHJ (2022) Deep learning-based attacks on masked AES implementation. Journal of Internet Technology 23(4):897–902 Lerman L, Bontempi G, Markowitch O (2014) A machine learning approach against a masked aes. Journal of Cryptographic Engineering 5:123–139 Gilmore R, Hanley N, O’Neill M (2015) Neural network based attack on a masked implementation of aes. In: 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). pp 106–111 Prouff E, Strullu R, Benadjila R, Cagli E, Canovas C (2018) Study of deep learning techniques for side-channel analysis and introduction to ascad database. IACR Cryptol. ePrint Arch 2018:53 Picek S, Heuser A, Jovic A, Bhasin S, Regazzoni F (2018) The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations. https://ia.cr/2018/476 Cagli E, Dumas C, Prouff E (2017) Convolutional neural networks with data augmentation against jitter-based countermeasures. In: Fischer W, Homma N (eds) Cryptographic Hardware and Embedded Systems - CHES 2017. Springer International Publishing, Cham, pp 45–68 Hu W, Wu L, Wang A, Xie X, Zhu Z, Luo S (2014) Adaptive chosen-plaintext correlation power analysis. In: 2014 Tenth International Conference on Computational Intelligence and Security. pp 494–498 Do N-T, Hoang V-P (2020) An efficient side channel attack technique with improved correlation power analysis. In: Vo N-S, Hoang V-P (eds) Industrial Networks and Intelligent Systems. Springer International Publishing, Cham, pp 291–300 Kingma D, Ba J (2014) Adam: A method for stochastic optimization. International Conference on Learning Representations 12