Skip to main content
Log in

Side-channel analysis attacks based on deep learning network

  • Research Article
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

Abstract

There has been a growing interest in the side-channel analysis (SCA) field based on deep learning (DL) technology. Various DL network or model has been developed to improve the efficiency of SCA. However, few studies have investigated the impact of the different models on attack results and the exact relationship between power consumption traces and intermediate values. Based on the convolutional neural network and the autoencoder, this paper proposes a Template Analysis Pre-trained DL Classification model named TAPDC which contains three sub-networks. The TAPDC model detects the periodicity of power trace, relating power to the intermediate values and mining the deeper features by the multi-layer convolutional net. We implement the TAPDC model and compare it with two classical models in a fair experiment. The evaluative results show that the TAPDC model with autoencoder and deep convolution feature extraction structure in SCA can more effectively extract information from power consumption trace. Also, Using the classifier layer, this model links power information to the probability of intermediate value. It completes the conversion from power trace to intermediate values and greatly improves the efficiency of the power attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Jaegeun M, Im Y Jung, Hyuk J P. IoT application protection against power analysis attack. Computers and Electrical Engineering, 2018, 67: 566–578

    Article  Google Scholar 

  2. Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model. In: Proceedings of International Conference on Cryptographic Hardware and Embedded Systems. 2004, 16–29

  3. Chang J, Wang H, Wang F, Zhang A, Ji Y. RKA security for identity-based signature scheme. IEEE Access, 2020, 8: 17833–17841

    Article  Google Scholar 

  4. Mangard S, Pramstaller N, Oswald E. Successfully attacking masked AES hardware implementations. In: Proceedings of International Conference on Cryptographic Hardware and Embedded Systems. 2005, 157–171

  5. Van Cleemput J, De Sutter B, De Bosschere B. Adaptive compiler strategies for mitigating timing side channel attacks. IEEE Transactions on Dependable and Secure Computing, 2020, 17(1): 35–49

    Article  Google Scholar 

  6. Yoshikawa M, Nozaki Y, Asahi K. Multiple rounds aware power analysis attack for a lightweight cipher SIMECK. In: Proceedings of IEEE Second International Conference on Big Data Computing Service & Applications. 2016, 252–256

  7. GO BS, Le DV, Song MG, Park M, Yu I K. Design and electromagnetic analysis of an induction-type coilgun system with a pulse power module. IEEE Transactions on Plasma Science, 2019, 47(1): 971–976

    Article  Google Scholar 

  8. Kocher P, Jaffe J, Jun B, Rohatgi P. Introduction to differential power analysis. Journal of Cryptographic Engineering, 2011, 1(1): 5–27

    Article  Google Scholar 

  9. Carlet C, Faugere J C, Goyet C, Renault G. Analysis of the algebraic side channel attack. Journal of Cryptographic Engineering, 2012, 2(1): 45–62

    Article  Google Scholar 

  10. Ghoshal A, Patranabis S, Mukhopadhyay D. Template-based fault injection analysis of block ciphers. In: Proceedings of International Conference on Security, Privacy, and Applied Cryptography Engineering. 2018, 21–36

  11. Wan W, Chen H, Chen J. The attack case of ECDSA on blockchain based on improved simple power analysis. In: Proceedings of International Conference on Artificial Intelligence and Security. 2019, 120–132

  12. Rivest R L. Cryptography and machine learning. In: Proceedings of Advances in Cryptology-ASIACRYPT. 1991, 427–439

  13. Hospodar G, Gierlichs B, Mulder E D, Verbauwhede I, Vandewalle J. Machine learning in side-channel analysis: a first study. Journal of Cryptographic Engineering, 2011, 1(4): 293–302

    Article  Google Scholar 

  14. Heuser A, Zohner M. Intelligent machine homicide-breaking cryptographic devices using support vector machines. In: Proceedings of Constructive Side-Channel Analysis and Secure Design. 2012, 249–264

  15. Bartkewitz T, Lemke-Rust K. Efficient template attacks based on probabilistic multi-class support vector machines. In: Proceedings of Smart Card Research and Advanced Applications. 2012, 263–276

  16. Lerman L, Poussier R, Bontempi G, Markowitch O, Standaert F X. Template attacks vs. machine learning revisited (and the curse of dimensionality in side-channel analysis). In: Proceedings of Constructive Side-Channel Analysis and Secure Design. 2015, 20–33

  17. Martinasek Z, Dzurenda P, Malina L. Profiling power analysis attack based on MLP in DPA contest V4.2. In: Proceedings of International Conference on Telecommunications and Signal Processing. 2016, 223–226

  18. Martinasek Z, Malina L, Trasy K. Profiling power analysis attack based on multi-layer perceptron network. Computational Problems in Science and Engineering, 2015, 343: 317–339

    Article  Google Scholar 

  19. Cagli E, Dumas C, Prouff E. Convolutional neural networks with data augmentation against jitter-based countermeasures. In: Proceedings of International Conference on Cryptographic Hardware and Embedded Systems. 2017, 45–68

  20. Maghrebi H, Portigliatti T, Prouff E. Breaking cryptographic implementations using deep learning techniques. In: Proceedings of International Conference on Security, Privacy, and Applied Cryptography Engineering. 2016, 3–26

  21. Prouff E, Strullu R, Benadjila R, Cagli E, Dumas C. Study of deep learning techniques for side-channel analysis and introduction to ASCAD database. Journal of Cryptographic Engineering, 2020, 10(2): 163–188

    Article  Google Scholar 

  22. Chen R, Wu W, Qi H, Wang J, Wang H. A stacked autoencoder neural network algorithm for breast cancer diagnosis with magnetic detection electrical impedance tomography. IEEE Access, 2020, 8: 5428–5437

    Article  Google Scholar 

Download references

Acknowledgements

This research was supported by the National Natural Science Foundation of China (Grant No.61572174), Hunan Province Special Funds of Central Government for Guiding Local Science and Technology Development (2018CT5001), Hunan Provincial Natural Science Foundation of China (2019JJ60004), the Scientific Research Fund of Hunan Provincial Education Department with (19A072), Subject group construction project of Hengyang Normal University (18XKQ02), Application-oriented Special Disciplines, Double First-Class University Project of Hunan Province (Xiang-jiaotong [2018] 469), the Science and Technology Plan Project of Hunan Province (2016TP1020).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lang Li.

Additional information

Yu Ou received a bachelor’s degree from Hengyang Normal University, Hengyang, China, in 2018. He is currently pursuing a master’s degree in the College of Information Science and Engineering, Hunan Normal University, China. His current research interests include embedded systems and information security.

Lang Li received his PhD and Master’s degrees in computer science from Hunan University, China, in 2010 and 2006, respectively, and earned his BS degree in circuits and systems from Hunan Normal University, China in 1996. Since 2011, he has been working as a professor in the College of Computer Science and Technology at the Hengyang Normal University, China. His research interests include embedded computing and information security.

Electronic Supplementary Material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ou, Y., Li, L. Side-channel analysis attacks based on deep learning network. Front. Comput. Sci. 16, 162303 (2022). https://doi.org/10.1007/s11704-020-0209-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11704-020-0209-4

Keywords

Navigation