Give Me 5 Minutes: Attacking ASCAD with a Single Side-Channel Trace

In this note, we describe an attack against the ANSSI Side-Channel Analysis Database (ASCAD), which recovers the full key using the leakage of a single masked block cipher execution. The attack uses a new open-source Side-Channel Analysis Library (SCALib), which allows running the leakage profiling and attacking in less than 5 minutes. It exploits well-known techniques, yet improves significantly over the best known attacks against ASCAD. We conclude by questioning the impact of these experimental findings for side-channel security evaluations.

[1]  A. Adam Ding,et al.  A Fast and Accurate Guessing Entropy Estimation Algorithm for Full-key Recovery , 2020, IACR Trans. Cryptogr. Hardw. Embed. Syst..

[2]  Éliane Jaulmes,et al.  A Systematic Appraisal of Side Channel Evaluation Strategies , 2020, SSR.

[3]  Dawu Gu,et al.  Pay Attention to Raw Traces: A Deep Learning Architecture for End-to-End Profiling Attacks , 2021, IACR Trans. Cryptogr. Hardw. Embed. Syst..

[4]  François-Xavier Standaert,et al.  Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations , 2019, IACR Cryptol. ePrint Arch..

[5]  François-Xavier Standaert,et al.  Breaking Masked Implementations with Many Shares on 32-bit Software Platforms or When the Security Order Does Not Matter , 2021, IACR Trans. Cryptogr. Hardw. Embed. Syst..

[6]  Nenghai Yu,et al.  A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data , 2020, IACR Trans. Cryptogr. Hardw. Embed. Syst..

[7]  Stjepan Picek,et al.  Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based Profiled Side-channel Analysis , 2020, IACR Trans. Cryptogr. Hardw. Embed. Syst..

[8]  Stefan Mangard,et al.  Hardware Countermeasures against DPA ? A Statistical Analysis of Their Effectiveness , 2004, CT-RSA.

[9]  Emmanuel Prouff,et al.  Deep learning for side-channel analysis and introduction to ASCAD database , 2019, Journal of Cryptographic Engineering.

[10]  Máire O'Neill,et al.  Plaintext: A Missing Feature for Enhancing the Power of Deep Learning in Side-Channel Analysis? Breaking multiple layers of side-channel countermeasures , 2020, IACR Trans. Cryptogr. Hardw. Embed. Syst..

[11]  Stjepan Picek,et al.  Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders , 2020, IACR Cryptol. ePrint Arch..

[12]  Lilian Bossuet,et al.  Methodology for Efficient CNN Architectures in Profiling Attacks , 2019, IACR Cryptol. ePrint Arch..

[13]  Cécile Canovas,et al.  A Comprehensive Study of Deep Learning for Side-Channel Analysis , 2019, IACR Cryptol. ePrint Arch..

[14]  Bart Preneel,et al.  Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks , 2020, IACR Trans. Cryptogr. Hardw. Embed. Syst..

[15]  Nenghai Yu,et al.  A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data , 2020 .

[16]  Romain Poussier,et al.  Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach , 2016, CHES.

[17]  François-Xavier Standaert,et al.  Soft Analytical Side-Channel Attacks , 2014, ASIACRYPT.

[18]  François-Xavier Standaert,et al.  Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages , 2008, CHES.