Paper 2022/232

Conditional Variational AutoEncoder based on Stochastic Attack

Gabriel Zaid, Thales ITSEF, Toulouse, France
Lilian Bossuet, Univ Lyon, UJM-Saint-Etienne, CNRS Laboratoire Hubert Curien UMR 5516 F-42023, Saint-Etienne, France
Mathieu Carbone, Thales ITSEF, Toulouse, France
Amaury Habrard, Univ Lyon, UJM-Saint-Etienne, CNRS Laboratoire Hubert Curien UMR 5516 F-42023, Saint-Etienne, France. Institut Universitaire de France (IUF), Paris, France.
Alexandre Venelli, NXP Semiconductors, France
Abstract

Over the recent years, the cryptanalysis community leveraged the potential of research on Deep Learning to enhance attacks. In particular, several studies have recently highlighted the benefits of Deep Learning based Side-Channel Attacks (DLSCA) to target real-world cryptographic implementations. While this new research area on applied cryptography provides impressive result to recover a secret key even when countermeasures are implemented (e.g. desynchronization, masking schemes), the lack of theoretical results make the construction of appropriate and powerful models a notoriously hard problem. This can be problematic during an evaluation process where a security bound is required. In this work, we propose the first solution that bridges DL and SCA in order to ease the use of DL techniques in an evaluation process. Based on theoretical results, we develop the first Machine Learning generative model, called Conditional Variational AutoEncoder based on Stochastic Attacks (cVAE-SA), designed from the well-known Stochastic Attacks, that have been introduced by Schindler et al. in $2005$. This model reduces the black-box property of DL and eases the architecture design for every real-world crypto-system as we define theoretical complexity bounds which only depend on the dimension of the (reduced) trace and the targeting variable over $\mathbb{F}_{2}^{n}$. We validate our theoretical proposition through simulations and public datasets on a wide range of use cases, including multi-task learning, curse of dimensionality and masking scheme.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
A major revision of an IACR publication in TCHES 2023
Keywords
Side-Channel AttacksDeep LearningGenerative-Discriminative ModelsStochastic AttacksVariational AutoEncoder
Contact author(s)
gabriel zaid @ thalesgroup com
History
2023-01-14: revised
2022-02-25: received
See all versions
Short URL
https://ia.cr/2022/232
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2022/232,
      author = {Gabriel Zaid and Lilian Bossuet and Mathieu Carbone and Amaury Habrard and Alexandre Venelli},
      title = {Conditional Variational {AutoEncoder} based on Stochastic Attack},
      howpublished = {Cryptology {ePrint} Archive, Paper 2022/232},
      year = {2022},
      url = {https://eprint.iacr.org/2022/232}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.