Effective Deep Learning-based Side-Channel Analyses Against ASCAD

Side-channel analysis (SCA) based on deep learning (DL) techniques have the benefit that they can disclose the secret key of protected block ciphers without preprocessing. But the size of convolutional neural network (CNN) architecture is so large that the training process is too time-consuming and the required number of traces for recovering secret key is too much. In this paper, we apply heatmap and SNR to reduce the number of parameters of our CNN architecture to 5,269,568 (i.e., one to tenth to the CNNbest). We also combine our CNN architecture with the multi-label classification and the transfer learning techniques to reduce the number of required traces. Consequently, two new CNN architectures are presented and validated on the public ASCAD dataset. The execution time of the training process approximates 15 minutes on average. The first CNN architecture can recover a key byte with only 30 synchronized traces. Combined with the transfer learning technique, the second CNN architecture requires 141 and 171 traces respectively in two different desynchronization cases. To our knowledge, for both synchronization and desynchronization cases, our analysis methods need the smallest amount of traces to extract a key byte.

[1]  Zongyue Wang,et al.  Multi-label Deep Learning based Side Channel Attack , 2019, 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST).

[2]  S. Hou,et al.  Convolutional Neural Networks for Profiled Side-channel Analysis , 2019, Radioengineering.

[3]  Romain Poussier,et al.  Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version , 2018, Journal of Cryptographic Engineering.

[4]  S. Hou,et al.  Wavelet Support Vector Machine Algorithm in Power Analysis Attacks , 2017 .

[5]  Emmanuel Prouff,et al.  Breaking Cryptographic Implementations Using Deep Learning Techniques , 2016, SPACE.

[6]  Elisabeth Oswald,et al.  Robust Profiling for DPA-Style Attacks , 2015, CHES.

[7]  Olivier Markowitch,et al.  Power analysis attack: an approach based on machine learning , 2014, Int. J. Appl. Cryptogr..

[8]  Zdenek Martinasek,et al.  Innovative Method of the Power Analysis , 2013 .

[9]  Kerstin Lemke-Rust,et al.  Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines , 2012, CARDIS.

[10]  Joos Vandewalle,et al.  Machine learning in side-channel analysis: a first study , 2011, Journal of Cryptographic Engineering.

[11]  Yoshua Bengio,et al.  Deep Sparse Rectifier Neural Networks , 2011, AISTATS.

[12]  Olivier Markowitch,et al.  Side channel attack: an approach based on machine learning , 2011 .

[13]  Qiang Yang,et al.  A Survey on Transfer Learning , 2010, IEEE Transactions on Knowledge and Data Engineering.

[14]  Moti Yung,et al.  A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..

[15]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[16]  Lilian Bossuet,et al.  Methodology for Efficient CNN Architectures in Profiling Attacks , 2019, IACR Cryptol. ePrint Arch..

[17]  Cécile Canovas,et al.  Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database , 2018, IACR Cryptol. ePrint Arch..

[18]  Emmanuel Prouff,et al.  Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing , 2017, CHES.