Paper 2023/1110

Breaking Free: Leakage Model-free Deep Learning-based Side-channel Analysis

Lichao Wu, Delft University of Technology
Amir Ali-pour, Independent researcher
Azade Rezaeezade, Delft University of Technology
Guilherme Perin, Leiden University
Stjepan Picek, Radboud University Nijmegen
Abstract

Profiling side-channel analysis has gained widespread acceptance in both academic and industrial realms due to its robust capacity to unveil protected secrets, even in the presence of countermeasures. To harness this capability, an adversary must access a clone of the target device to acquire profiling measurements, labeling them with leakage models. The challenge of finding an effective leakage model, especially for a protected dataset with a low signal-to-noise ratio or weak correlation between actual leakages and labels, often necessitates an intuitive engineering approach, as otherwise, the attack will not perform well. In this paper, we introduce a deep learning approach that does not assume any specific leakage model, referred to as the multibit model. Instead of trying to learn a representation of the target intermediate data (label), we utilize the concept of the stochastic model to decompose the label into bits. Then, the deep learning model is used to classify each bit independently. This versatile multibit model can align with existing leakage models like the Hamming weight and Most Significant Bit leakage models while also possessing the flexibility to adapt to complex leakage scenarios. To further improve the attack efficiency, we extend the multibit model to simultaneously attack all 16 subkey bytes, which requires negligible computational effort. Based on our preliminary analysis, two of the four considered datasets could only be broken using a Hamming Weight leakage model. Using the same model, the proposed methods can efficiently crack all key bytes across four considered datasets. Our work, thus, signifies a significant step forward in deep learning-based side-channel attacks, showcasing a high degree of flexibility and efficiency without any presumption of the leakage model.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Side-channel AnalysisDeep learningMultibit modelMulti-task learning
Contact author(s)
lichao wu9 @ gmail com
alipouramir93 @ gmail com
A Rezaeezade-1 @ tudelft nl
guilhermeperin7 @ gmail com
picek stjepan @ gmail com
History
2023-07-17: approved
2023-07-16: received
See all versions
Short URL
https://ia.cr/2023/1110
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/1110,
      author = {Lichao Wu and Amir Ali-pour and Azade Rezaeezade and Guilherme Perin and Stjepan Picek},
      title = {Breaking Free: Leakage Model-free Deep Learning-based Side-channel Analysis},
      howpublished = {Cryptology ePrint Archive, Paper 2023/1110},
      year = {2023},
      note = {\url{https://eprint.iacr.org/2023/1110}},
      url = {https://eprint.iacr.org/2023/1110}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.