Abstract
Differential deep learning analysis (DDLA) is the first side-channel attack (SCA) evaluation using deep learning (DL) in the non-profiled scenario. However, DDLA requires many training processes to distinguish the correct key. In this paper, we propose an SCA evaluation technique using the multi-output regression neural network, which can simultaneously estimate all key hypotheses in a single training process. Consequently, the performance of non-profiled DL-based SCA can improve significantly. Concretely, two multi-output regression models based on multi-layer perceptron (MOR-MLP) and convolutional neural network (MOR-CNN) are introduced against various SCA protected schemes, such as masking, noise generation, and trace de-synchronization countermeasures. Especially, we first suggest using identity labeling for multi-output regression to determine the trend of the training metric for each hypothesis key in the non-profiled SCA scenario. As a result, the correct key can be distinguished easily. The proposed network is fine-tuned with different variants of the shared layer based on both power consumption and electromagnetic radiation data. The experimental results show that our proposed models using identity label work well on different SCA datasets. Significantly, our approach remarkably outperforms the DDLA model in terms of execution time and success rate. Specifically, the results of evaluating the de-synchronized dataset show that the MOR-CNN model performs the attacks up to 40 times faster than \({\textrm{DDLA}}_{\textrm{CNN}}\). Regarding masking dataset, the MOR-MLP model achieves a higher success rate of at least \(30\%\) and \(44\%\) in the case of using the fastest \({\textrm{DDLA}}_{\textrm{MLP}}\) model and the original \({\textrm{DDLA}}_{\textrm{MLP}}\) model, respectively.
Similar content being viewed by others
References
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology—CRYPTO’ 99, pp. 388–397. Springer, Berlin, Heidelberg (1999)
Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Lecture Notes in Computer Science, pp. 16–29. Springer, Berlin, Heidelberg (2004)
Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Koç, ç.K., Paar, C. (eds) Cryptographic Hardware and Embedded Systems-CHES 2002, pp. 13–28. Springer, Berlin, Heidelberg (2003)
Elaabid, M., Guilley, S., Hoogvorst, P.: Template attacks with a power model. In: IACR Cryptology ePrint Archive. 443, 01 (2007)
Lerman, L., Poussier, R., Markowitch, O., Standaert, F.-X.: Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version. J. Cryptogr. Eng. 8(4), 301–313 (2017)
Hospodar, G., Gierlichs, B., Mulder, E.D., Verbauwhede, I., Vandewalle, J.: Machine learning in side-channel analysis: a first study. J. Cryptogr. Eng. 1(4), 293–302 (2011)
Ramezanpour, K., Ampadu, P., Diehl, W.: SCAUL: power side-channel analysis with unsupervised learning. IEEE Trans. Comput. 69(11), 1626–1638 (2020)
Lerman, L., Markowitch, O.: Efficient profiled attacks on masking schemes. IEEE Trans. Inf. Forensics Secur. 14(6), 1445–1454 (2019)
Nassar, M., Souissi, Y., Guilley, S., Danger, J.-L.: Rsm: a small and fast countermeasure for aes, secure against 1st and 2nd-order zero-offset scas. In: Design. Automation Test in Europe Conference Exhibition (DATE) 2012, pp. 1173–1178 (2012)
Veyrat-Charvillon, N., Medwed, M., Kerckhof, S., Standaert, F.-X.: Shuffling against side-channel attacks: a comprehensive study with cautionary note. In: Wang X, Sako, K (eds) Advances in Cryptology—ASIACRYPT 2012, pp. 740–757. Springer, Berlin, Heidelberg (2012)
Coron , J.-S., Kizhvatov, I.: An efficient method for random delay generation in embedded software. In: Clavier, C., Gaj, K. (eds) Cryptographic Hardware and Embedded Systems-CHES 2009, pp 156–170. Springer, Berlin, Heidelberg (2009)
Dao, B.-A., Hoang, T.-T., Le, A.-T., Tsukamoto, A., Suzaki, K., Pham, C.-K.P.: Correlation power analysis attack resisted cryptographic RISC-v SoC with random dynamic frequency scaling countermeasure. IEEE Access 9, 151993–152014 (2021)
Jin, S., Kim, S., Kim, H., Hong, S.: Recent advances in deep learning-based side-channel analysis. ETRI J. 42(2), 292–304 (2020)
Xu, D., Shi, Y., Tsang, I.W., Ong, Y.-s., Gong, C., Shen, X.: Survey on Multi-Output Learning, pp. 1–21 (2019)
Aho, T., Bženko, T., Džeroski, S., Elomaa, T.: Multi-target regression with rule ensembles. J. Mach. Learn. Res. 13, 2367–2407 (2012)
Spyromitros-Xioufis, E., Groves, W., Tsoumakas, G., Vlahavas, I.: Multi-label classification methods for multi-target regression 11 (2012)
Tsoumakas, G., Spyromitros-Xioufis, E., Vrekou, A., Vlahavas, I.: Multi-target regression via random linear target combinations. In: Machine Learning and Knowledge Discovery in Databases, pp. 225–240. Springer, Berlin, Heidelberg (2014)
Borchani, H., Varando, G., Bielza, C., Larrañaga, P.: A survey on multi-output regression. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 5(5), 216–233 (2015)
Reyes, O., Ventura, S.: Performing multi-target regression via a parameter sharing-based deep network. Int. J. Neural Syst. (2019)
Timon, B.: Non-profiled deep learning-based side-channel attacks with sensitivity analysis. IACR Trans. Cryptogr. Hardw. Embedd. Syst 2019(2), 07–131 (2019)
Alipour, A., Papadimitriou, A., Beroulle, V., Aerabi, E., Hely, D.: On the performance of non-profiled differential deep learning attacks against an AES encryption algorithm protected using a correlated noise generation based hiding countermeasure. In: Proceedings of the 2020 Design, Automation and Test in Europe Conference and Exhibition, DATE 2020, pp. 614–617 (2020)
Kuroda, K., Fukuda, Y., Yoshida, K., Fujino, T.: Practical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM, pp. 29–40 (2021)
Won, Y.S., Han, D.G., Jap, D., Bhasin, S., Park, J.Y.: Non-profiled side-channel attack based on deep learning using picture trace. IEEE Access 9, 22480–22492 (2021)
Kwon, D., Kim, H., Hong, S.: Non-profiled deep learning-based side-channel preprocessing with autoencoders. IEEE Access 9, 57692–57703 (2021)
Maghrebi, H.: Deep learning based side-channel attack: a new profiling methodology based on multi-label classification. Eprint 2020-436, 1, pp. 1–34 (2020). https://eprint.iacr.org/2020/436
Zhang, L., Xing, X., Fan, J., Wang, Z., Wang, S.: Multilabel deep learning-based side-channel attack. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6), 1207–1216 (2021)
Prouff, E., Strullu, R., Benadjila, R., Cagli, E., Dumas, C.: Study of deep learning techniques for side-channel analysis and introduction to ASCAD database. CoRR, pp. 1–46 (2018)
Do, N.-T., Hoang, V.-P., Doan, V.-S.: Performance analysis of non-profiled side channel attacks based on convolutional neural networks. In: 2020 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). IEEE (2020)
Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. In: Security, Privacy, and Applied Cryptography Engineering, pp. 3–26. Springer (2016)
Picek, S., Heuser, A., Jovic, A., Bhasin, S., Regazzoni, F.: The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 209–237 (2018)
Won, Y.S., Bhasin, S.: On use of deep learning for side channel evaluation of black box hardware AES engine. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST Vol. 379, pp. 185–194 (2021)
Groenendijk, R., Karaoglu, S., Gevers, T, Mensink, T.: Multi-loss weighting with coefficient of variations. In: 2021 IEEE Winter Conference on Applications of Computer Vision (WACV). IEEE (2021)
Acknowledgements
This research is funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under Grant number 102.02\(-\)2020.14.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Do, NT., Hoang, VP. & Doan, V.S. A novel non-profiled side channel attack based on multi-output regression neural network. J Cryptogr Eng 14, 427–439 (2024). https://doi.org/10.1007/s13389-023-00314-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13389-023-00314-4