Paper 2020/1096

Far Field EM Side-Channel Attack on AES Using Deep Learning

Ruize Wang, Huanyu Wang, and Elena Dubrova


We present the first deep learning-based side-channel attack on AES-128 using far field electromagnetic emissions as a side channel. Our neural networks are trained on traces captured from five different Bluetooth devices at five different distances to target and tested on four other Bluetooth devices. We can recover the key from less than 10K traces captured in an office environment at 15 m distance to target even if the measurement for each encryption is taken only once. Previous template attacks required multiple repetitions of the same encryption. For the case of 1K repetitions, we need less than 400 traces on average at 15 m distance to target. This improves the template attack presented at CHES'2020 which requires 5K traces and key enumeration up to $2^{23}$.

Available format(s)
Secret-key cryptography
Publication info
Published elsewhere. MINOR revision.4th ACM Workshop on Attacks and Solutions in Hardware Security (ASHES’2020), November 13, 2020
Side-channel analysisEM analysisfar field EM emissionsprofiled attackdeep learningAES
Contact author(s)
dubrova @ kth se
2020-09-15: received
Short URL
Creative Commons Attribution


      author = {Ruize Wang and Huanyu Wang and Elena Dubrova},
      title = {Far Field EM Side-Channel Attack on AES Using Deep Learning},
      howpublished = {Cryptology ePrint Archive, Paper 2020/1096},
      year = {2020},
      doi = {10.1145/3411504.3421214},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.