Citation: | Zhang Runlian, Pan Zhaoxuan, Li Jinlin, Wu Xiaonian, Wei Yongzhuang. A Side Channel Attack Based on Multi-Source Data Aggregation Neural Network[J]. Journal of Computer Research and Development, 2024, 61(1): 261-270. DOI: 10.7544/issn1000-1239.202220172 |
Side channel attack based on deep learning needs to model and train each key byte of the cryptographic algorithm, which costs a lot of data acquisition and model training. To solve this problem, a side channel attack method based on multi-source data aggregation neural network is proposed. In order to screen the leaked data of key byte with good generalization quality for data aggregation, taking AES-128 algorithm as an example, firstly 16 single key byte models are trained based on the leaked data of 16 key bytes, and models are used to recover 16 key bytes respectively. Secondly, a scoring mechanism is designed to evaluate the generalization effect of each single key byte model, and models with the best recovery effect for each key byte are selected according to score sorting. Finally, a multi-source data aggregation model is constructed based on the key byte leaked data sets corresponding to the selected models to realize key recovery. The tested results show that the multi-source data aggregation model has good generalization effect, effectively improves the accuracy and efficiency of key recovery, reduces the number of traces used to recover the key, and the model also has good attack effect in the case of less traces.
[1] |
王安,葛婧,商宁,等. 侧信道分析实用案例概述[J]. 密码学报,2018,5(4):383−398 doi: 10.13868/j.cnki.jcr.000249
Wang An, Ge Jing, Shang Ning, et al. Practical cases of side-channel analysis[J]. Journal of Cryptologic Research, 2018, 5(4): 383−398 (in Chinese) doi: 10.13868/j.cnki.jcr.000249
|
[2] |
Zhang Libang, Xing Xinpeng, Fan Junfeng, et al. Multi-label deep learning based side channel attack[C/OL] //Proc of the 2019 Asian Hardware Oriented Security and Trust Symp. Piscataway, NJ: IEEE, 2019[2022-01-10]. https://ieeexplore.ieee.org/document/9006657
|
[3] |
Ghandali S, Ghandali S, Tehranipoor S. Profiled power-analysis attacks by an efficient architectural extension of a CNN implementation[C] //Proc of the 22nd Int Symp on Quality Electronic Design. Piscataway, NJ: IEEE, 2021: 395−400
|
[4] |
Kim J, Picek S, Heuser A, et al. Make some noise: Unleashing the power of convolutional neural networks for profiled side-channel analysis[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019, 2019(3): 148−179
|
[5] |
Maghrebi H, Portigliatti T, Prouff E. Breaking cryptographic implementations using deep learning techniques[C] //Proc of the 5th Int Conf on Security, Privacy, and Applied Cryptography Engineering. Berlin: Springer, 2016: 3−26
|
[6] |
Cagli E, Dumas C, Prouff E. Convolutional neural networks with data augmentation against jitter-based countermeasures[C] //Proc of the 19th Int Conf on Cryptographic Hardware and Embedded Systems. Berlin: Springer, 2017: 45−68
|
[7] |
Benadjila, R, Prouff, E, Strullu, R. et al. Deep learning for side-channel analysis and introduction to ASCAD database[J]. Journal of Cryptographic Engineering, 2020, 10(2): 163−188 doi: 10.1007/s13389-019-00220-8
|
[8] |
Wang Huanyu, Dubrova E. Federated learning in side-channel analysis [C] //Proc of the 16th Int Conf on Information Security and Cryptology. Berlin: Springer, 2020: 257−272
|
[9] |
Perin G, Chmielewski L, Picek S. Strength in numbers: Improving generalization with ensembles in machine learning-based profiled side-channel analysis[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020(4): 337−364
|
[10] |
Won Y S, Han D G, Jap D, et al. Non-profiled side-channel attack based on deep learning using picture trace[J]. IEEE Access, 2021, 9: 22480−22492 doi: 10.1109/ACCESS.2021.3055833
|
[11] |
Zaid G, Bossuet L, François D, et al. Ranking loss: Maximizing the success rate in deep learning side-channel analysis[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2021(1): 25−55
|
[12] |
王恺,严迎建,郭朋飞,等. 基于改进残差网络和数据增强技术的能量分析攻击研究[J]. 密码学报,2020,7(4):551−564 doi: 10.13868/j.cnki.jcr.000389
Wang Kai, Yan Yingjian, Guo Pengfei, et al. Research on power analysis attack based on improved residual network and data augmentation technology[J]. Journal of Cryptologic Research, 2020, 7(4): 551−564 (in Chinese) doi: 10.13868/j.cnki.jcr.000389
|
[13] |
Wang Ping, Chen Ping, Luo Zhimin, et al. Enhancing the performance of practical profiling side-channel attacks using conditional generative adversarial networks[EB/OL]. 2020[2022-01-10]. https://eprint.iacr.org/2020/867
|
[14] |
Luo Zhimin, Zheng Mengce, Wang Ping, et al. Towards strengthening deep learning-based side channel attacks with mixup[EB/OL]. 2021[2022-01-10]. https://eprint.iacr.org/2021/312
|
[15] |
Abdellatif K M. Mixup data augmentation for deep learning side-channel attacks[EB/OL]. 2021[2022-01-10]. https://eprint.iacr.org/2021/328
|
[16] |
Zhang Hongyi, Cisse M, Dauphin Y N, et al. Mixup: Beyond empirical risk minimization[C/OL] //Proc of the 6th Int Conf on Learning Representations. Amherst, MA: OpenReview. net, 2018 [2022-01-10]. https://openreview.net/pdf?id=r1Ddp1-Rb
|
[17] |
Nassar M, Souissi Y, Guilley S, et al. RSM: A small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs[C] //Proc of the 15th Design, Automation and Test in Europe Conf and Exhibition. Piscataway, NJ: IEEE, 2012: 1173−1178
|
[18] |
Gilmore R, Hanley N, O’Neill M. Neural network based attack on a masked implementation of AES[C] //Proc of the 2015 IEEE Int Symp on Hardware Oriented Security and Trust. Piscataway, NJ: IEEE, 2015: 106−111
|
[1] | Cao Yiran, Zhu Youwen, He Xingyu, Zhang Yue. Utility-Optimized Local Differential Privacy Set-Valued Data Frequency Estimation Mechanism[J]. Journal of Computer Research and Development, 2022, 59(10): 2261-2274. DOI: 10.7544/issn1000-1239.20220504 |
[2] | Hong Jinxin, Wu Yingjie, Cai Jianping, Sun Lan. Differentially Private High-Dimensional Binary Data Publication via Attribute Segmentation[J]. Journal of Computer Research and Development, 2022, 59(1): 182-196. DOI: 10.7544/issn1000-1239.20200701 |
[3] | Wu Wanqing, Zhao Yongxin, Wang Qiao, Di Chaofan. A Safe Storage and Release Method of Trajectory Data Satisfying Differential Privacy[J]. Journal of Computer Research and Development, 2021, 58(11): 2430-2443. DOI: 10.7544/issn1000-1239.2021.20210589 |
[4] | Zhang Yuxuan, Wei Jianghong, Li Ji, Liu Wenfen, Hu Xuexian. Graph Degree Histogram Publication Method with Node-Differential Privacy[J]. Journal of Computer Research and Development, 2019, 56(3): 508-520. DOI: 10.7544/issn1000-1239.2019.20170886 |
[5] | Zhu Weijun, You Qingguang, Yang Weidong, Zhou Qinglei. Trajectory Privacy Preserving Based on Statistical Differential Privacy[J]. Journal of Computer Research and Development, 2017, 54(12): 2825-2832. DOI: 10.7544/issn1000-1239.2017.20160647 |
[6] | Wu Yingjie, Zhang Liqun, Kang Jian, Wang Yilei. An Algorithm for Differential Privacy Streaming Data Adaptive Publication[J]. Journal of Computer Research and Development, 2017, 54(12): 2805-2817. DOI: 10.7544/issn1000-1239.2017.20160555 |
[7] | Wang Liang, Wang Weiping, Meng Dan. Privacy Preserving Data Publishing via Weighted Bayesian Networks[J]. Journal of Computer Research and Development, 2016, 53(10): 2343-2353. DOI: 10.7544/issn1000-1239.2016.20160465 |
[8] | Lu Guoqing, Zhang Xiaojian, Ding Liping, Li Yanfeng, Liao Xin. Frequent Sequential Pattern Mining under Differential Privacy[J]. Journal of Computer Research and Development, 2015, 52(12): 2789-2801. DOI: 10.7544/issn1000-1239.2015.20140516 |
[9] | Ouyang Jia, Yin Jian, Liu Shaopeng, Liu Yubao. An Effective Differential Privacy Transaction Data Publication Strategy[J]. Journal of Computer Research and Development, 2014, 51(10): 2195-2205. DOI: 10.7544/issn1000-1239.2014.20130824 |
[10] | Ni Weiwei, Chen Geng, Chong Zhihong, Wu Yingjie. Privacy-Preserving Data Publication for Clustering[J]. Journal of Computer Research and Development, 2012, 49(5): 1095-1104. |