Cross-Subkey Deep-Learning Side-Channel Analysis

The majority of recently demonstrated Deep-Learning Side-Channel Attacks (DLSCAs) use neural networks trained on a segment of traces containing operations only related to the target subkey. However, when the number of training traces are restricted such as in this paper only 5K power traces, deep-learning models always suffer from underfitting since the insufficient training data. One data-level solution is called data augmentation, which is to use the additional synthetically modified traces to act as a regularizer to provide a better generalization capacity for deep-learning models. In this paper, we propose a cross-subkey training approach which acts as a trace augmentation. We train deep-learning models not only on a segment of traces containing the SBox operation of the target subkey of AES-128, but also on segments for other 15 subkeys. Experimental results show that the accuracy of the subkey combination training model is 28.20% higher than that of the individual subkey training model on trajectories captured in the microcontroller implementation of the STM32F3 with AES-128. At the same time, the number of traces that need to be captured when the model is trained is greatly reduced, demonstrating the effectiveness and practicality of the method.

[1]  Jia Wu,et al.  Automatic Measurement of Fetal Cavum Septum Pellucidum From Ultrasound Images Using Deep Attention Network , 2020, 2020 IEEE International Conference on Image Processing (ICIP).

[2]  Cécile Canovas,et al.  A Comprehensive Study of Deep Learning for Side-Channel Analysis , 2019, IACR Cryptol. ePrint Arch..

[3]  Elena Dubrova,et al.  Tandem Deep Learning Side-Channel Attack Against FPGA Implementation of AES , 2020, 2020 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS).

[4]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[5]  Alan Hanjalic,et al.  Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis , 2019, IACR Cryptol. ePrint Arch..

[6]  Zhizhang Chen,et al.  ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research , 2014, COSADE.

[7]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[8]  Kota Yoshida,et al.  Deep Learning Side-Channel Attack Against Hardware Implementations of AES , 2019, 2019 22nd Euromicro Conference on Digital System Design (DSD).

[9]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[10]  Stefan Mangard,et al.  Power analysis attacks - revealing the secrets of smart cards , 2007 .

[11]  Elena Dubrova,et al.  How Diversity Affects Deep-Learning Side-Channel Attacks , 2019, 2019 IEEE Nordic Circuits and Systems Conference (NORCAS): NORCHIP and International Symposium of System-on-Chip (SoC).

[12]  Zongyue Wang,et al.  Multilabel Deep Learning-Based Side-Channel Attack , 2021, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[13]  Shreyas Sen,et al.  X-DeepSCA: Cross-Device Deep Learning Side Channel Attack* , 2019, 2019 56th ACM/IEEE Design Automation Conference (DAC).

[14]  Elena Dubrova,et al.  Multi-Source Training Deep-Learning Side-Channel Attacks , 2020, 2020 IEEE 50th International Symposium on Multiple-Valued Logic (ISMVL).

[15]  Taghi M. Khoshgoftaar,et al.  A survey on Image Data Augmentation for Deep Learning , 2019, Journal of Big Data.

[16]  Shreyas Sen,et al.  Practical Approaches Toward Deep-Learning-Based Cross-Device Power Side-Channel Attack , 2019, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[17]  François Durvaux,et al.  From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces , 2016, EUROCRYPT.

[18]  Guillermo Sapiro,et al.  Image Enhancement and Restoration , 2014, Computer Vision, A Reference Guide.

[19]  Leo Breiman,et al.  Bagging Predictors , 1996, Machine Learning.

[20]  Cécile Canovas,et al.  Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database , 2018, IACR Cryptol. ePrint Arch..