Skip to main content
Log in

Performance Analysis of Deep Learning Based Non-profiled Side Channel Attacks Using Significant Hamming Weight Labeling

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

The use of deep learning (DL) techniques for side-channel analysis (SCA) has become increasingly popular recently. This paper assesses the application of DL to non-profiled SCA attacks on AES-128 encryption, taking into consideration various challenges, including high-dimensional data, imbalanced classes, and countermeasures. The paper proposes using a multi-layer perceptron (MLP) and a convolutional neural network (CNN) to tackle hiding protection methods, such as noise generation and de-synchronization. The paper also introduces a technique called significant Hamming weight (SHW) labeling and a dataset reconstruction approach to handle imbalanced datasets, resulting in a reduction of 30% in the number of measurements required for training. The experimental results on reconstructed dataset demonstrate improved performance in DL-based SCA compared to binary labeling techniques, especially in the face of hiding countermeasures. This leads to better results for non-profiled attacks on different targets, such as ASCAD and RISC-V microcontrollers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data Availability

Not applicable

References

  1. Hettwer TGB, Gehrer S (2020) Applications of machine learning techniques in side-channel attacks: a survey. J Cryptogr Eng 10:135–162

    Article  Google Scholar 

  2. Timon B (2019) Non-Profiled Deep Learning-based Side-Channel attacks with Sensitivity Analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019(2), 107–131. https://doi.org/10.13154/tches.v2019.i2.107-131

  3. Picek S, Samiotis IP, Kim J, Heuser A, Bhasin S, Legay A (2018) On the performance of convolutional neural networks for side-channel analysis. In: Chattopadhyay A, Rebeiro C, Yarom Y (eds) Security, Privacy, and Applied Cryptography Engineering. Springer International Publishing, Cham, pp 157–176

    Chapter  Google Scholar 

  4. Alipour A, Papadimitriou A, Beroulle V, Aerabi E, Hély D (2020) On the performance of non-profiled differential deep learning attacks against an aes encryption algorithm protected using a correlated noise generation based hiding countermeasure. In: 2020 Design, Automation Test in Europe Conference Exhibition (DATE). pp 614–617

  5. Won Y-S, Han D-G, Jap D, Bhasin S, Park J-Y (2021) Non-profiled side-channel attack based on deep learning using picture trace. IEEE Access 9:22 480–22 492

  6. Do NT, Hoang VP , Doan VS (2020) Performance analysis of non-profiled side channel attacks based on convolutional neural networks. In: 2020 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). pp 66–69

  7. Bae DBD, Bae JHD, Hwang JHJ (2022) Deep learning-based attacks on masked AES implementation. Journal of Internet Technology 23(4):897–902

    Article  Google Scholar 

  8. Lerman L, Bontempi G, Markowitch O (2014) A machine learning approach against a masked aes. Journal of Cryptographic Engineering 5:123–139

    Article  Google Scholar 

  9. Gilmore R, Hanley N, O’Neill M (2015) Neural network based attack on a masked implementation of aes. In: 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). pp 106–111

  10. Prouff E, Strullu R, Benadjila R, Cagli E, Canovas C (2018) Study of deep learning techniques for side-channel analysis and introduction to ascad database. IACR Cryptol. ePrint Arch 2018:53

    Google Scholar 

  11. Picek S, Heuser A, Jovic A, Bhasin S, Regazzoni F (2018) The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations. https://ia.cr/2018/476

  12. Cagli E, Dumas C, Prouff E (2017) Convolutional neural networks with data augmentation against jitter-based countermeasures. In: Fischer W, Homma N (eds) Cryptographic Hardware and Embedded Systems - CHES 2017. Springer International Publishing, Cham, pp 45–68

    Chapter  Google Scholar 

  13. Hu W, Wu L, Wang A, Xie X, Zhu Z, Luo S (2014) Adaptive chosen-plaintext correlation power analysis. In: 2014 Tenth International Conference on Computational Intelligence and Security. pp 494–498

  14. Do N-T, Hoang V-P (2020) An efficient side channel attack technique with improved correlation power analysis. In: Vo N-S, Hoang V-P (eds) Industrial Networks and Intelligent Systems. Springer International Publishing, Cham, pp 291–300

    Chapter  Google Scholar 

  15. Kingma D, Ba J (2014) Adam: A method for stochastic optimization. International Conference on Learning Representations 12

Download references

Funding

This research is funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under grant number 102.02-2020.14.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ngoc-Tuan Do.

Ethics declarations

Conflicts of interest

The authors declare no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This work was partly presented at the 8th EAI International Conference on Industrial Networks and Intelligent Systems (INISCOM 2022).

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hoang, VP., Do, NT. & Doan, V.S. Performance Analysis of Deep Learning Based Non-profiled Side Channel Attacks Using Significant Hamming Weight Labeling. Mobile Netw Appl 28, 1187–1196 (2023). https://doi.org/10.1007/s11036-023-02128-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-023-02128-4

Keywords

Navigation