The investigation of neural networks performance in side-channel attacks | Artificial Intelligence Review Skip to main content
Log in

The investigation of neural networks performance in side-channel attacks

  • Published:
Artificial Intelligence Review Aims and scope Submit manuscript

Abstract

Scientists have devoted a lot of affords to guarantee the safety of cryptosystems by improving cryptography algorithms, while these systems can still be vulnerable to side-channel information analysis based on neural networks (NNs) and principal component analysis (PCA). PCA can be used as a preprocessing stage, while NNs can learn the signature (power consumption and electromagnetic emission) of an instruction of a cryptography algorithm, and then recognizes it later automatically. This paper investigate the performance of NNs as a powerful classifier to analysis the side-channel information. For this purpose, an experimental investigation was conducted based on the power consumption and electromagnetic emission analysis of a field-programmable gate array implementation of elliptic curve cryptography. In our experimental results, the performance of different NNs topologies are compared which provide useful information for cryptosystem designers. In addition an efficient NN topology is introduced for characterization of side-channel information.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • Akishita T, Takagi T (2003) Zero-value point attacks on elliptic curve cryptosystem. Springer, Berlin

    Book  MATH  Google Scholar 

  • Archambeau Cédric, Peeters E, Standaert F-X, Quisquater J-J (2006) Template attacks in principal subspaces. In: Cryptographic hardware and embedded systems-CHES 2006. Springer, pp 1–14

  • Badde DS, Gupta AK, Patki VK (2013) Cascade and feed forward back propagation artificial neural network models for prediction of compressive strength of ready mix concrete. IOSR J Mech Civil Eng 3:1–6

    Google Scholar 

  • Bartkewitz T, Lemke-Rust K (2013) Efficient template attacks based on probabilistic multi-class support vector machines. Springer, Berlin

    Book  Google Scholar 

  • Blake IF, Seroussi G, Smart N (1999) Elliptic curves in cryptography, vol 265. Cambridge University Press, Cambridge

    Book  MATH  Google Scholar 

  • Chari S, Rao JR, Rohatgi P (2003) Template attacks. In: Cryptographic hardware and embedded systems-CHES 2002. Springer, pp 13–28

  • Cybenko G (1989) Approximation by superpositions of a sigmoidal function. Math Control Signals Syst 2(4):303–314

    Article  MathSciNet  MATH  Google Scholar 

  • Devijver PA, Kittler J (1982) Pattern recognition: a statistical approach, vol 761. Prentice-Hall, London

    MATH  Google Scholar 

  • Ge Q, Yarom Y, Cock D, Heiser G (2016) A survey of microarchitectural timing attacks and countermeasures on contemporary hardware. J Cryptogr Eng 8:1–27

    Article  Google Scholar 

  • Goundar RR, Joye M, Miyaji A (2010) Co-z addition formulæ and binary ladders on elliptic curves. In: Cryptographic hardware and embedded systems, CHES 2010. Springer, pp 65–79

  • Haykin SS (2009) Neural networks and learning machines, vol 3. Pearson Education, Upper Saddle River

    Google Scholar 

  • Heuser A, Zohner M (2012) Intelligent machine homicide. In: Constructive side-channel analysis and secure design. Springer, pp 249–264

  • Hornik K, Stinchcombe M, White H (1989) Multilayer feedforward networks are universal approximators. Neural Netw 2(5):359–366

    Article  MATH  Google Scholar 

  • Inci MS, Gulmezoglu B, Eisenbarth T, Sunar B (2016) Co-location detection on the cloud. In: International workshop on constructive side-channel analysis and secure design. Springer, pp 19–34

  • Jolliffe I (2005) Principal component analysis. Wiley, Hoboken

    MATH  Google Scholar 

  • Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203–209

    Article  MathSciNet  MATH  Google Scholar 

  • Lipp M (2016) Cache attacks on arm. Ph.D. thesis, Masters thesis, Graz, University of Technology. https://HrBwww.blackhat.com/docs/eu-16/materials/eu-16-Lipp-ARMageddon-How-Your-Smartphone-CPU-BrHrBeaks-Software-Level-Security-And-Privacy-wp.pdf,2006

  • Medwed M, Oswald E (2008) Template attacks on ecdsa. In: Information security applications. Springer, pp 14–27

  • Miller VS (1986) Use of elliptic curves in cryptography. In: Williams HC (ed) Advances in cryptology—CRYPTO 85 proceedings, vol 218. Lecture notes in computer science. Springer, Berlin, pp 417–426

    Google Scholar 

  • Minsky ML, Papert SA (1987) Perceptrons–expanded edition: an introduction to computational geometry. MIT press, Boston

    MATH  Google Scholar 

  • Raghu PP, Yegnanarayana B (1998) Supervised texture classification using a probabilistic neural network and constraint satisfaction model. IEEE Trans Neural Netw 9(3):516–522

    Article  Google Scholar 

  • Saeedi E, Kong Y (2014) Side channel information analysis based on machine learning. In: 2014 8th international conference on signal processing and communication systems (ICSPCS). IEEE, pp 1–7

  • Saeedi E, Hossain MS, Kong Y (2015) Multi-class SVMS analysis of side-channel information of elliptic curve cryptosystem. In: 2015 international symposium on performance evaluation of computer and telecommunication systems (SPECTS). IEEE, pp 1–6

  • Smith LI (2002) A tutorial on principal components analysis, 51:52. Cornell University, Ithaca

    Google Scholar 

  • Specht DF (1990) Probabilistic neural networks. Neural Netw 3(1):109–118

    Article  Google Scholar 

  • Varadarajan V, Zhang Y, Ristenpart T, Swift MM (2015) A placement vulnerability study in multi-tenant public clouds. In: USENIX security symposium, pp 913–928

  • Xu Z, Wang H, Wu Z (2015) A measurement study on co-residence threat inside the cloud. In: USENIX security symposium, pp 929–944

  • Yarom Y, Genkin D, Heninger N (2017) Cachebleed: a timing attack on openssl constant-time rsa. J Cryptogr Eng 7(2):99–112

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ehsan Saeedi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kong, Y., Saeedi, E. The investigation of neural networks performance in side-channel attacks. Artif Intell Rev 52, 607–623 (2019). https://doi.org/10.1007/s10462-018-9640-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10462-018-9640-4

Keywords