Design of Deep Learning Techniques for Side-Channel Attacks on Masked 128-bit AES Implementations

https://doi.org/10.61710/kjcs.v2i1.74

المؤلفون

  • mohammed Saeb Nahi
  • Ahmed Fattah Imam Al-Kadhum College
  • Hassan Jameel Mutashar
  • Opeyemi Lateef Usman

الكلمات المفتاحية:

AES، Deep Learning، VGG، Side Channel Analysis and Attacks

الملخص

Researchers are exploring the use of convolutional neural networks (CNNs) in side-channel attacks to understand the weaknesses in cryptographic implementation. CNNs can learn hierarchical characteristics automatically from electromagnetic radiation or power usage during cryptographic processes. Researchers train CNNs on side-channel data to extract meaningful representations and deduce secret keys. Deep learning algorithms are helpful in evaluating the security of embedded systems, and CNNs are a feasible paradigm for profiling side-channel analysis attacks. In this paper, it has been introduced a VGG (Visual Geometry Group)-Net architecture, which is a typical deep convolutional neural network design with numerous layers. It uses the ASCAD dataset to conduct experiments. They found that VGG-Net architecture Side Channel Attacks (SCA) provides better results than the previously optimized CNN model by significantly reducing the number of side-channel traces required for successful attacks on desynchronized datasets. The researchers also discovered that synchronous traces serve as the pre-training source for VGG-Net architecture, functioning successfully in terms of jittering with minimal fine-adjusting after training

المراجع

K. Kuroda, Y. Fukuda, K. Yoshida, and T. Fujino, “Practical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM,” in Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, 2021, pp. 29–40.

A. A. Ahmed, M. K. Hasan, N. S. Nafi, A. H. Aman, S. Islam, and M. S. Nahi, “Optimization Technique for Deep Learning Methodology on Power Side Channel Attacks,” in 2023 33rd International Telecommunication Networks and Applications Conference, 2023, pp. 80–83.

D. Bae, J. Hwang, and J. Ha, “Breaking a masked aes implementation using a deep learning-based attack,” in Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, 2020, pp. 1–5.

A. A. Ahmed, M. K. Hasan, N. S. Nafi, A. H. Aman, S. Islam, and S. A. Fadhil, “Design of Lightweight Cryptography based Deep Learning Model for Side Channel Attacks,” in 2023 33rd International Telecommunication Networks and Applications Conference, 2023, pp. 325–328.

S. Picek, G. Perin, L. Mariot, L. Wu, and L. Batina, “Sok: Deep learning-based physical side-channel analysis,” ACM Comput. Surv., vol. 55, no. 11, pp. 1–35, 2023.

A. A. Ahmed et al., “Detection of Crucial Power Side Channel Data Leakage in Neural Networks,” in 2023 33rd International Telecommunication Networks and Applications Conference, 2023, pp. 57–62.

A. Rădulescu and M. O. Choudary, “Side-Channel Attacks on Masked Bitsliced Implementations of AES,” Cryptography, vol. 6, no. 3, p. 31, 2022.

A. A. Ahmed and M. K. Hasan, “Design and Implementation of Side Channel Attack Based on Deep Learning LSTM,” in 2023 IEEE Region 10 Symposium (TENSYMP), 2023, pp. 1–6.

R. Gilmore, N. Hanley, and M. O’Neill, “Neural network based attack on a masked implementation of AES,” in 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2015, pp. 106–111.

A. A. Ahmed, R. A. Salim, and M. K. Hasan, “Deep Learning Method for Power Side-Channel Analysis on Chip Leakages,” Elektron. ir Elektrotechnika, vol. 29, no. 6, pp. 50–57, 2023.

P. Socha, V. Miškovský, and M. Novotný, “A comprehensive survey on the non-invasive passive side-channel analysis,” Sensors, vol. 22, no. 21, p. 8096, 2022.

A. A. Ahmed, M. K. Hasan, S. Islam, A. H. M. Aman, and N. Safie, “Design of Convolutional Neural Networks Architecture for Non-Profiled Side-Channel Attack Detection,” Elektron. Ir Elektrotechnika, vol. 29, no. 4, pp. 76–81, 2023.

N. Do, V. Hoang, V. S. Doan, and C. Pham, “On the performance of non‐profiled side channel attacks based on deep learning techniques,” IET Inf. Secur., vol. 17, no. 3, pp. 377–393, 2023.

M. Randolph and W. Diehl, “Power side-channel attack analysis: A review of 20 years of study for the layman,” Cryptography, vol. 4, no. 2, p. 15, 2020.

G. Hospodar, B. Gierlichs, E. De Mulder, I. Verbauwhede, and J. Vandewalle, “Machine learning in side-channel analysis: a first study,” J. Cryptogr. Eng., vol. 1, no. 4, pp. 293–302, 2011.

K. Pu, H. Dang, F. Kong, J. Zhang, and W. Wang, “A Quantitative Analysis of Non-Profiled Side-Channel Attacks Based on Attention Mechanism,” Electronics, vol. 12, no. 15, p. 3279, 2023.

J. Ming, Y. Zhou, H. Li, and Q. Zhang, “A secure and highly efficient first-order masking scheme for AES linear operations,” Cybersecurity, vol. 4, pp. 1–15, 2021.

S. Jin, P. Johansson, H. Kim, and S. Hong, “Enhancing time-frequency analysis with zero-mean preprocessing,” Sensors, vol. 22, no. 7, p. 2477, 2022.

S. R. Shanmugham and S. Paramasivam, “Power analysis attack resilient block cipher implementation based on 1‐of‐4 data encoding,” ETRI J., vol. 43, no. 4, pp. 746–757, 2021.

F. Kenarangi and I. Partin-Vaisband, “Security Network On-Chip for Mitigating Side-Channel Attacks,” in 2019 ACM/IEEE International Workshop on System Level Interconnect Prediction (SLIP), 2019, pp. 1–6.

منشور

2024-03-14

كيفية الاقتباس

Saeb Nahi, mohammed, Fattah, A., Mutashar, H. J., & Usman, O. L. (2024). Design of Deep Learning Techniques for Side-Channel Attacks on Masked 128-bit AES Implementations. مجلة الكاظم لعلوم الحاسوب, 2(1), 86–96. https://doi.org/10.61710/kjcs.v2i1.74

إصدار

القسم

Computer Science