Abstract
Scientists have devoted a lot of affords to guarantee the safety of cryptosystems by improving cryptography algorithms, while these systems can still be vulnerable to side-channel information analysis based on neural networks (NNs) and principal component analysis (PCA). PCA can be used as a preprocessing stage, while NNs can learn the signature (power consumption and electromagnetic emission) of an instruction of a cryptography algorithm, and then recognizes it later automatically. This paper investigate the performance of NNs as a powerful classifier to analysis the side-channel information. For this purpose, an experimental investigation was conducted based on the power consumption and electromagnetic emission analysis of a field-programmable gate array implementation of elliptic curve cryptography. In our experimental results, the performance of different NNs topologies are compared which provide useful information for cryptosystem designers. In addition an efficient NN topology is introduced for characterization of side-channel information.









Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Akishita T, Takagi T (2003) Zero-value point attacks on elliptic curve cryptosystem. Springer, Berlin
Archambeau Cédric, Peeters E, Standaert F-X, Quisquater J-J (2006) Template attacks in principal subspaces. In: Cryptographic hardware and embedded systems-CHES 2006. Springer, pp 1–14
Badde DS, Gupta AK, Patki VK (2013) Cascade and feed forward back propagation artificial neural network models for prediction of compressive strength of ready mix concrete. IOSR J Mech Civil Eng 3:1–6
Bartkewitz T, Lemke-Rust K (2013) Efficient template attacks based on probabilistic multi-class support vector machines. Springer, Berlin
Blake IF, Seroussi G, Smart N (1999) Elliptic curves in cryptography, vol 265. Cambridge University Press, Cambridge
Chari S, Rao JR, Rohatgi P (2003) Template attacks. In: Cryptographic hardware and embedded systems-CHES 2002. Springer, pp 13–28
Cybenko G (1989) Approximation by superpositions of a sigmoidal function. Math Control Signals Syst 2(4):303–314
Devijver PA, Kittler J (1982) Pattern recognition: a statistical approach, vol 761. Prentice-Hall, London
Ge Q, Yarom Y, Cock D, Heiser G (2016) A survey of microarchitectural timing attacks and countermeasures on contemporary hardware. J Cryptogr Eng 8:1–27
Goundar RR, Joye M, Miyaji A (2010) Co-z addition formulæ and binary ladders on elliptic curves. In: Cryptographic hardware and embedded systems, CHES 2010. Springer, pp 65–79
Haykin SS (2009) Neural networks and learning machines, vol 3. Pearson Education, Upper Saddle River
Heuser A, Zohner M (2012) Intelligent machine homicide. In: Constructive side-channel analysis and secure design. Springer, pp 249–264
Hornik K, Stinchcombe M, White H (1989) Multilayer feedforward networks are universal approximators. Neural Netw 2(5):359–366
Inci MS, Gulmezoglu B, Eisenbarth T, Sunar B (2016) Co-location detection on the cloud. In: International workshop on constructive side-channel analysis and secure design. Springer, pp 19–34
Jolliffe I (2005) Principal component analysis. Wiley, Hoboken
Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203–209
Lipp M (2016) Cache attacks on arm. Ph.D. thesis, Masters thesis, Graz, University of Technology. https://HrBwww.blackhat.com/docs/eu-16/materials/eu-16-Lipp-ARMageddon-How-Your-Smartphone-CPU-BrHrBeaks-Software-Level-Security-And-Privacy-wp.pdf,2006
Medwed M, Oswald E (2008) Template attacks on ecdsa. In: Information security applications. Springer, pp 14–27
Miller VS (1986) Use of elliptic curves in cryptography. In: Williams HC (ed) Advances in cryptology—CRYPTO 85 proceedings, vol 218. Lecture notes in computer science. Springer, Berlin, pp 417–426
Minsky ML, Papert SA (1987) Perceptrons–expanded edition: an introduction to computational geometry. MIT press, Boston
Raghu PP, Yegnanarayana B (1998) Supervised texture classification using a probabilistic neural network and constraint satisfaction model. IEEE Trans Neural Netw 9(3):516–522
Saeedi E, Kong Y (2014) Side channel information analysis based on machine learning. In: 2014 8th international conference on signal processing and communication systems (ICSPCS). IEEE, pp 1–7
Saeedi E, Hossain MS, Kong Y (2015) Multi-class SVMS analysis of side-channel information of elliptic curve cryptosystem. In: 2015 international symposium on performance evaluation of computer and telecommunication systems (SPECTS). IEEE, pp 1–6
Smith LI (2002) A tutorial on principal components analysis, 51:52. Cornell University, Ithaca
Specht DF (1990) Probabilistic neural networks. Neural Netw 3(1):109–118
Varadarajan V, Zhang Y, Ristenpart T, Swift MM (2015) A placement vulnerability study in multi-tenant public clouds. In: USENIX security symposium, pp 913–928
Xu Z, Wang H, Wu Z (2015) A measurement study on co-residence threat inside the cloud. In: USENIX security symposium, pp 929–944
Yarom Y, Genkin D, Heninger N (2017) Cachebleed: a timing attack on openssl constant-time rsa. J Cryptogr Eng 7(2):99–112
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kong, Y., Saeedi, E. The investigation of neural networks performance in side-channel attacks. Artif Intell Rev 52, 607–623 (2019). https://doi.org/10.1007/s10462-018-9640-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10462-018-9640-4