You are looking at a specific version 20191023:084701 of this paper. See the latest version.

Paper 2019/1242

Non-Profiled Side Channel Attack based on Deep learning using Picture Trace

Yoo-Seung Won and Jong-Yeon Park

Abstract

In this paper, we suggest a new format for converting side channel traces to fully utilize the deep learning schemes. Due to the fact that many deep learning schemes have been advanced based on MNIST style datasets, we convert from raw-trace based on float or byte data to picture-formatted trace based on position. This is induced that the best performance can be acquired from deep learning schemes. Although the overfitting cannot be avoided in our suggestion, the accuracy for validation outperforms to previous results of side channel analysis based on deep learning. Additionally, we provide a novel criteria for attack success or fail based on statistical confidence level rather than rule of thumb. Even though the data storage is slightly increased, our suggestion can completely be recovered the correct key compared to previous results. Moreover, our suggestion scheme has a lot of potential to improve side channel attack.

Note: This paper will be submitted a specific conference.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
Non-profiled side channel attackDeep learningMulti-layer perceptronConvolutional neural network
Contact author(s)
mathwys87 @ kookmin ac kr,jonyeon park @ samsung com
History
2020-04-15: revised
2019-10-23: received
See all versions
Short URL
https://ia.cr/2019/1242
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.