• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Runlian, Pan Zhaoxuan, Li Jinlin, Wu Xiaonian, Wei Yongzhuang. A Side Channel Attack Based on Multi-Source Data Aggregation Neural Network[J]. Journal of Computer Research and Development, 2024, 61(1): 261-270. DOI: 10.7544/issn1000-1239.202220172
Citation: Zhang Runlian, Pan Zhaoxuan, Li Jinlin, Wu Xiaonian, Wei Yongzhuang. A Side Channel Attack Based on Multi-Source Data Aggregation Neural Network[J]. Journal of Computer Research and Development, 2024, 61(1): 261-270. DOI: 10.7544/issn1000-1239.202220172

A Side Channel Attack Based on Multi-Source Data Aggregation Neural Network

Funds: This work was supported by the National Natural Science Foundation of China (62062026, 61872103), the Innovation Research Team Project of Guangxi (2019GXNSFGA245004), the Scientific Research Project of Young Innovative Talents of Guangxi (guike AD20238082), the Guangxi Natural Science Foundation (2020GXNSFBA297076), and the Graduate Innovation Project of Guangxi (2022YCXS082).
More Information
  • Author Bio:

    Zhang Runlian: born in 1974. PhD, associate professor. Her main research interests include information security and distributed computing

    Pan Zhaoxuan: born in 1997. Master candidate. His main research interest includes side channel analysis

    Li Jinlin: born in 1997. Master candidate. His main research interests include network security and application, and side channel analysis

    Wu Xiaonian: born in 1972. Master, professor. His main research interests include information security and distributed computing

    Wei Yongzhuang: born in 1976. PhD, professors, PhD supervisor. His main research interests include symmetric ciphers and security analysis of protocol

  • Received Date: February 28, 2022
  • Revised Date: December 22, 2022
  • Available Online: April 17, 2023
  • Side channel attack based on deep learning needs to model and train each key byte of the cryptographic algorithm, which costs a lot of data acquisition and model training. To solve this problem, a side channel attack method based on multi-source data aggregation neural network is proposed. In order to screen the leaked data of key byte with good generalization quality for data aggregation, taking AES-128 algorithm as an example, firstly 16 single key byte models are trained based on the leaked data of 16 key bytes, and models are used to recover 16 key bytes respectively. Secondly, a scoring mechanism is designed to evaluate the generalization effect of each single key byte model, and models with the best recovery effect for each key byte are selected according to score sorting. Finally, a multi-source data aggregation model is constructed based on the key byte leaked data sets corresponding to the selected models to realize key recovery. The tested results show that the multi-source data aggregation model has good generalization effect, effectively improves the accuracy and efficiency of key recovery, reduces the number of traces used to recover the key, and the model also has good attack effect in the case of less traces.

  • [1]
    王安,葛婧,商宁,等. 侧信道分析实用案例概述[J]. 密码学报,2018,5(4):383−398 doi: 10.13868/j.cnki.jcr.000249

    Wang An, Ge Jing, Shang Ning, et al. Practical cases of side-channel analysis[J]. Journal of Cryptologic Research, 2018, 5(4): 383−398 (in Chinese) doi: 10.13868/j.cnki.jcr.000249
    [2]
    Zhang Libang, Xing Xinpeng, Fan Junfeng, et al. Multi-label deep learning based side channel attack[C/OL] //Proc of the 2019 Asian Hardware Oriented Security and Trust Symp. Piscataway, NJ: IEEE, 2019[2022-01-10]. https://ieeexplore.ieee.org/document/9006657
    [3]
    Ghandali S, Ghandali S, Tehranipoor S. Profiled power-analysis attacks by an efficient architectural extension of a CNN implementation[C] //Proc of the 22nd Int Symp on Quality Electronic Design. Piscataway, NJ: IEEE, 2021: 395−400
    [4]
    Kim J, Picek S, Heuser A, et al. Make some noise: Unleashing the power of convolutional neural networks for profiled side-channel analysis[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019, 2019(3): 148−179
    [5]
    Maghrebi H, Portigliatti T, Prouff E. Breaking cryptographic implementations using deep learning techniques[C] //Proc of the 5th Int Conf on Security, Privacy, and Applied Cryptography Engineering. Berlin: Springer, 2016: 3−26
    [6]
    Cagli E, Dumas C, Prouff E. Convolutional neural networks with data augmentation against jitter-based countermeasures[C] //Proc of the 19th Int Conf on Cryptographic Hardware and Embedded Systems. Berlin: Springer, 2017: 45−68
    [7]
    Benadjila, R, Prouff, E, Strullu, R. et al. Deep learning for side-channel analysis and introduction to ASCAD database[J]. Journal of Cryptographic Engineering, 2020, 10(2): 163−188 doi: 10.1007/s13389-019-00220-8
    [8]
    Wang Huanyu, Dubrova E. Federated learning in side-channel analysis [C] //Proc of the 16th Int Conf on Information Security and Cryptology. Berlin: Springer, 2020: 257−272
    [9]
    Perin G, Chmielewski L, Picek S. Strength in numbers: Improving generalization with ensembles in machine learning-based profiled side-channel analysis[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020(4): 337−364
    [10]
    Won Y S, Han D G, Jap D, et al. Non-profiled side-channel attack based on deep learning using picture trace[J]. IEEE Access, 2021, 9: 22480−22492 doi: 10.1109/ACCESS.2021.3055833
    [11]
    Zaid G, Bossuet L, François D, et al. Ranking loss: Maximizing the success rate in deep learning side-channel analysis[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2021(1): 25−55
    [12]
    王恺,严迎建,郭朋飞,等. 基于改进残差网络和数据增强技术的能量分析攻击研究[J]. 密码学报,2020,7(4):551−564 doi: 10.13868/j.cnki.jcr.000389

    Wang Kai, Yan Yingjian, Guo Pengfei, et al. Research on power analysis attack based on improved residual network and data augmentation technology[J]. Journal of Cryptologic Research, 2020, 7(4): 551−564 (in Chinese) doi: 10.13868/j.cnki.jcr.000389
    [13]
    Wang Ping, Chen Ping, Luo Zhimin, et al. Enhancing the performance of practical profiling side-channel attacks using conditional generative adversarial networks[EB/OL]. 2020[2022-01-10]. https://eprint.iacr.org/2020/867
    [14]
    Luo Zhimin, Zheng Mengce, Wang Ping, et al. Towards strengthening deep learning-based side channel attacks with mixup[EB/OL]. 2021[2022-01-10]. https://eprint.iacr.org/2021/312
    [15]
    Abdellatif K M. Mixup data augmentation for deep learning side-channel attacks[EB/OL]. 2021[2022-01-10]. https://eprint.iacr.org/2021/328
    [16]
    Zhang Hongyi, Cisse M, Dauphin Y N, et al. Mixup: Beyond empirical risk minimization[C/OL] //Proc of the 6th Int Conf on Learning Representations. Amherst, MA: OpenReview. net, 2018 [2022-01-10]. https://openreview.net/pdf?id=r1Ddp1-Rb
    [17]
    Nassar M, Souissi Y, Guilley S, et al. RSM: A small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs[C] //Proc of the 15th Design, Automation and Test in Europe Conf and Exhibition. Piscataway, NJ: IEEE, 2012: 1173−1178
    [18]
    Gilmore R, Hanley N, O’Neill M. Neural network based attack on a masked implementation of AES[C] //Proc of the 2015 IEEE Int Symp on Hardware Oriented Security and Trust. Piscataway, NJ: IEEE, 2015: 106−111
  • Related Articles

    [1]Cao Yiran, Zhu Youwen, He Xingyu, Zhang Yue. Utility-Optimized Local Differential Privacy Set-Valued Data Frequency Estimation Mechanism[J]. Journal of Computer Research and Development, 2022, 59(10): 2261-2274. DOI: 10.7544/issn1000-1239.20220504
    [2]Hong Jinxin, Wu Yingjie, Cai Jianping, Sun Lan. Differentially Private High-Dimensional Binary Data Publication via Attribute Segmentation[J]. Journal of Computer Research and Development, 2022, 59(1): 182-196. DOI: 10.7544/issn1000-1239.20200701
    [3]Wu Wanqing, Zhao Yongxin, Wang Qiao, Di Chaofan. A Safe Storage and Release Method of Trajectory Data Satisfying Differential Privacy[J]. Journal of Computer Research and Development, 2021, 58(11): 2430-2443. DOI: 10.7544/issn1000-1239.2021.20210589
    [4]Zhang Yuxuan, Wei Jianghong, Li Ji, Liu Wenfen, Hu Xuexian. Graph Degree Histogram Publication Method with Node-Differential Privacy[J]. Journal of Computer Research and Development, 2019, 56(3): 508-520. DOI: 10.7544/issn1000-1239.2019.20170886
    [5]Zhu Weijun, You Qingguang, Yang Weidong, Zhou Qinglei. Trajectory Privacy Preserving Based on Statistical Differential Privacy[J]. Journal of Computer Research and Development, 2017, 54(12): 2825-2832. DOI: 10.7544/issn1000-1239.2017.20160647
    [6]Wu Yingjie, Zhang Liqun, Kang Jian, Wang Yilei. An Algorithm for Differential Privacy Streaming Data Adaptive Publication[J]. Journal of Computer Research and Development, 2017, 54(12): 2805-2817. DOI: 10.7544/issn1000-1239.2017.20160555
    [7]Wang Liang, Wang Weiping, Meng Dan. Privacy Preserving Data Publishing via Weighted Bayesian Networks[J]. Journal of Computer Research and Development, 2016, 53(10): 2343-2353. DOI: 10.7544/issn1000-1239.2016.20160465
    [8]Lu Guoqing, Zhang Xiaojian, Ding Liping, Li Yanfeng, Liao Xin. Frequent Sequential Pattern Mining under Differential Privacy[J]. Journal of Computer Research and Development, 2015, 52(12): 2789-2801. DOI: 10.7544/issn1000-1239.2015.20140516
    [9]Ouyang Jia, Yin Jian, Liu Shaopeng, Liu Yubao. An Effective Differential Privacy Transaction Data Publication Strategy[J]. Journal of Computer Research and Development, 2014, 51(10): 2195-2205. DOI: 10.7544/issn1000-1239.2014.20130824
    [10]Ni Weiwei, Chen Geng, Chong Zhihong, Wu Yingjie. Privacy-Preserving Data Publication for Clustering[J]. Journal of Computer Research and Development, 2012, 49(5): 1095-1104.
  • Cited by

    Periodical cited type(5)

    1. 张涵,于航,周继威,白云开,赵路坦. 面向隐私计算的可信执行环境综述. 计算机应用. 2025(02): 467-481 .
    2. 付裕,林璟锵,冯登国. 虚拟化与密码技术应用:现状与未来. 密码学报(中英文). 2024(01): 3-21 .
    3. 徐传康,李忠月,刘天宇,种统洪,杨发雪. 基于可信执行环境的汽车域控系统安全研究. 汽车实用技术. 2024(15): 18-25+73 .
    4. 徐文嘉,岑孟杰,陈亮. 隐私保护下单细胞RNA测序数据细胞分类研究. 医学信息学杂志. 2024(10): 86-89 .
    5. 孙钰,熊高剑,刘潇,李燕. 基于可信执行环境的安全推理研究进展. 信息网络安全. 2024(12): 1799-1818 .

    Other cited types(4)

Catalog

    Article views (184) PDF downloads (111) Cited by(9)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return