A novel non-profiled side channel attack based on multi-output regression neural network | Journal of Cryptographic Engineering Skip to main content
Log in

A novel non-profiled side channel attack based on multi-output regression neural network

  • Regular Paper
  • Published:
Journal of Cryptographic Engineering Aims and scope Submit manuscript

Abstract

Differential deep learning analysis (DDLA) is the first side-channel attack (SCA) evaluation using deep learning (DL) in the non-profiled scenario. However, DDLA requires many training processes to distinguish the correct key. In this paper, we propose an SCA evaluation technique using the multi-output regression neural network, which can simultaneously estimate all key hypotheses in a single training process. Consequently, the performance of non-profiled DL-based SCA can improve significantly. Concretely, two multi-output regression models based on multi-layer perceptron (MOR-MLP) and convolutional neural network (MOR-CNN) are introduced against various SCA protected schemes, such as masking, noise generation, and trace de-synchronization countermeasures. Especially, we first suggest using identity labeling for multi-output regression to determine the trend of the training metric for each hypothesis key in the non-profiled SCA scenario. As a result, the correct key can be distinguished easily. The proposed network is fine-tuned with different variants of the shared layer based on both power consumption and electromagnetic radiation data. The experimental results show that our proposed models using identity label work well on different SCA datasets. Significantly, our approach remarkably outperforms the DDLA model in terms of execution time and success rate. Specifically, the results of evaluating the de-synchronized dataset show that the MOR-CNN model performs the attacks up to 40 times faster than \({\textrm{DDLA}}_{\textrm{CNN}}\). Regarding masking dataset, the MOR-MLP model achieves a higher success rate of at least \(30\%\) and \(44\%\) in the case of using the fastest \({\textrm{DDLA}}_{\textrm{MLP}}\) model and the original \({\textrm{DDLA}}_{\textrm{MLP}}\) model, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology—CRYPTO’ 99, pp. 388–397. Springer, Berlin, Heidelberg (1999)

  2. Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Lecture Notes in Computer Science, pp. 16–29. Springer, Berlin, Heidelberg (2004)

  3. Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Koç, ç.K., Paar, C. (eds) Cryptographic Hardware and Embedded Systems-CHES 2002, pp. 13–28. Springer, Berlin, Heidelberg (2003)

  4. Elaabid, M., Guilley, S., Hoogvorst, P.: Template attacks with a power model. In: IACR Cryptology ePrint Archive. 443, 01 (2007)

  5. Lerman, L., Poussier, R., Markowitch, O., Standaert, F.-X.: Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version. J. Cryptogr. Eng. 8(4), 301–313 (2017)

    Article  Google Scholar 

  6. Hospodar, G., Gierlichs, B., Mulder, E.D., Verbauwhede, I., Vandewalle, J.: Machine learning in side-channel analysis: a first study. J. Cryptogr. Eng. 1(4), 293–302 (2011)

    Article  Google Scholar 

  7. Ramezanpour, K., Ampadu, P., Diehl, W.: SCAUL: power side-channel analysis with unsupervised learning. IEEE Trans. Comput. 69(11), 1626–1638 (2020)

    Article  Google Scholar 

  8. Lerman, L., Markowitch, O.: Efficient profiled attacks on masking schemes. IEEE Trans. Inf. Forensics Secur. 14(6), 1445–1454 (2019)

    Article  Google Scholar 

  9. Nassar, M., Souissi, Y., Guilley, S., Danger, J.-L.: Rsm: a small and fast countermeasure for aes, secure against 1st and 2nd-order zero-offset scas. In: Design. Automation Test in Europe Conference Exhibition (DATE) 2012, pp. 1173–1178 (2012)

  10. Veyrat-Charvillon, N., Medwed, M., Kerckhof, S., Standaert, F.-X.: Shuffling against side-channel attacks: a comprehensive study with cautionary note. In: Wang X, Sako, K (eds) Advances in Cryptology—ASIACRYPT 2012, pp. 740–757. Springer, Berlin, Heidelberg (2012)

  11. Coron , J.-S., Kizhvatov, I.: An efficient method for random delay generation in embedded software. In: Clavier, C., Gaj, K. (eds) Cryptographic Hardware and Embedded Systems-CHES 2009, pp 156–170. Springer, Berlin, Heidelberg (2009)

  12. Dao, B.-A., Hoang, T.-T., Le, A.-T., Tsukamoto, A., Suzaki, K., Pham, C.-K.P.: Correlation power analysis attack resisted cryptographic RISC-v SoC with random dynamic frequency scaling countermeasure. IEEE Access 9, 151993–152014 (2021)

    Article  Google Scholar 

  13. Jin, S., Kim, S., Kim, H., Hong, S.: Recent advances in deep learning-based side-channel analysis. ETRI J. 42(2), 292–304 (2020)

    Article  MathSciNet  Google Scholar 

  14. Xu, D., Shi, Y., Tsang, I.W., Ong, Y.-s., Gong, C., Shen, X.: Survey on Multi-Output Learning, pp. 1–21 (2019)

  15. Aho, T., Bženko, T., Džeroski, S., Elomaa, T.: Multi-target regression with rule ensembles. J. Mach. Learn. Res. 13, 2367–2407 (2012)

    MathSciNet  Google Scholar 

  16. Spyromitros-Xioufis, E., Groves, W., Tsoumakas, G., Vlahavas, I.: Multi-label classification methods for multi-target regression 11 (2012)

  17. Tsoumakas, G., Spyromitros-Xioufis, E., Vrekou, A., Vlahavas, I.: Multi-target regression via random linear target combinations. In: Machine Learning and Knowledge Discovery in Databases, pp. 225–240. Springer, Berlin, Heidelberg (2014)

  18. Borchani, H., Varando, G., Bielza, C., Larrañaga, P.: A survey on multi-output regression. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 5(5), 216–233 (2015)

    Article  Google Scholar 

  19. Reyes, O., Ventura, S.: Performing multi-target regression via a parameter sharing-based deep network. Int. J. Neural Syst. (2019)

  20. Timon, B.: Non-profiled deep learning-based side-channel attacks with sensitivity analysis. IACR Trans. Cryptogr. Hardw. Embedd. Syst 2019(2), 07–131 (2019)

    Google Scholar 

  21. Alipour, A., Papadimitriou, A., Beroulle, V., Aerabi, E., Hely, D.: On the performance of non-profiled differential deep learning attacks against an AES encryption algorithm protected using a correlated noise generation based hiding countermeasure. In: Proceedings of the 2020 Design, Automation and Test in Europe Conference and Exhibition, DATE 2020, pp. 614–617 (2020)

  22. Kuroda, K., Fukuda, Y., Yoshida, K., Fujino, T.: Practical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM, pp. 29–40 (2021)

  23. Won, Y.S., Han, D.G., Jap, D., Bhasin, S., Park, J.Y.: Non-profiled side-channel attack based on deep learning using picture trace. IEEE Access 9, 22480–22492 (2021)

    Article  Google Scholar 

  24. Kwon, D., Kim, H., Hong, S.: Non-profiled deep learning-based side-channel preprocessing with autoencoders. IEEE Access 9, 57692–57703 (2021)

    Article  Google Scholar 

  25. Maghrebi, H.: Deep learning based side-channel attack: a new profiling methodology based on multi-label classification. Eprint 2020-436, 1, pp. 1–34 (2020). https://eprint.iacr.org/2020/436

  26. Zhang, L., Xing, X., Fan, J., Wang, Z., Wang, S.: Multilabel deep learning-based side-channel attack. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6), 1207–1216 (2021)

    Article  Google Scholar 

  27. Prouff, E., Strullu, R., Benadjila, R., Cagli, E., Dumas, C.: Study of deep learning techniques for side-channel analysis and introduction to ASCAD database. CoRR, pp. 1–46 (2018)

  28. Do, N.-T., Hoang, V.-P., Doan, V.-S.: Performance analysis of non-profiled side channel attacks based on convolutional neural networks. In: 2020 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). IEEE (2020)

  29. Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. In: Security, Privacy, and Applied Cryptography Engineering, pp. 3–26. Springer (2016)

  30. Picek, S., Heuser, A., Jovic, A., Bhasin, S., Regazzoni, F.: The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 209–237 (2018)

  31. Won, Y.S., Bhasin, S.: On use of deep learning for side channel evaluation of black box hardware AES engine. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST Vol. 379, pp. 185–194 (2021)

  32. Groenendijk, R., Karaoglu, S., Gevers, T, Mensink, T.: Multi-loss weighting with coefficient of variations. In: 2021 IEEE Winter Conference on Applications of Computer Vision (WACV). IEEE (2021)

Download references

Acknowledgements

This research is funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under Grant number 102.02\(-\)2020.14.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Van-Phuc Hoang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Do, NT., Hoang, VP. & Doan, V.S. A novel non-profiled side channel attack based on multi-output regression neural network. J Cryptogr Eng 14, 427–439 (2024). https://doi.org/10.1007/s13389-023-00314-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13389-023-00314-4

Keywords

Navigation