Tandem Deep Learning Side-Channel Attack on FPGA Implementation of AES
Side-channel attacks have become a realistic threat to implementations of cryptographic algorithms, especially with the help of deep-learning techniques. The majority of recently demonstrated deep-learning side-channel attacks use a single neural network classifier to extract the secret from impleme...
Saved in:
| Published in | SN computer science Vol. 2; no. 5; p. 373 |
|---|---|
| Main Authors | , |
| Format | Journal Article |
| Language | English |
| Published |
Singapore
Springer Singapore
01.09.2021
Springer Nature B.V |
| Subjects | |
| Online Access | Get full text |
| ISSN | 2662-995X 2661-8907 2661-8907 |
| DOI | 10.1007/s42979-021-00755-w |
Cover
| Summary: | Side-channel attacks have become a realistic threat to implementations of cryptographic algorithms, especially with the help of deep-learning techniques. The majority of recently demonstrated deep-learning side-channel attacks use a single neural network classifier to extract the secret from implementations of cryptographic algorithms. The potential benefits of combining multiple classifiers using the ensemble learning method have not been fully explored in the side-channel attack’s context. In this paper, we propose a tandem approach for the attack in which multiple models are trained on different attack points but are used in parallel to recover the key. Such an approach allows us to considerably reduce (33.5% on average) the number of traces required to recover the key from an FPGA implementation of AES by power analysis. We also show that not all combinations of classifiers improve the attack efficiency. |
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ISSN: | 2662-995X 2661-8907 2661-8907 |
| DOI: | 10.1007/s42979-021-00755-w |