Paper 2025/157

Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis

Azade Rezaeezade, Delft University of Technology, The Netherlands
Trevor Yap, Nanyang Technological University, Singapore
Dirmanto Jap, Nanyang Technological University, Singapore
Shivam Bhasin, Nanyang Technological University, Singapore
Stjepan Picek, Radboud University, The Netherlands
Abstract

Physical side-channel analysis (SCA) operates on the foundational assumption of access to known plaintext or ciphertext. However, this assumption can be easily invalidated in various scenarios, ranging from common encryption modes like Cipher Block Chaining (CBC) to complex hardware implementations, where such data may be inaccessible. Blind SCA addresses this challenge by operating without the knowledge of plaintext or ciphertext. Unfortunately, prior such approaches have shown limited success in practical settings. In this paper, we introduce the Deep Learning-based Blind Side-channel Analysis (DL-BSCA) framework, which leverages deep neural networks to recover secret keys in blind SCA settings. In addition, we propose a novel labeling method, Multi-point Cluster-based (MC) labeling, accounting for dependencies between leakage variables by exploiting multiple sample points for each variable, improving the accuracy of trace labeling. We validate our approach across four datasets, including symmetric key algorithms (AES and Ascon) and a post-quantum cryptography algorithm, Kyber, with platforms ranging from high-leakage 8-bit AVR XMEGA to noisy 32-bit ARM STM32F4. Notably, previous methods failed to recover the key on the same datasets. Furthermore, we demonstrate the first successful blind SCA on a desynchronization countermeasure enabled by DL-BSCA and MC labeling. All experiments are validated with real-world SCA measurements, highlighting the practicality and effectiveness of our approach.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Deep Learning-based Side-Channel AttackBlind Side-Channel AttackClusteringKyberAscon
Contact author(s)
a rezaeezade-1 @ tudelft nl
trevor yap @ ntu edu sg
djap @ ntu edu sg
sbhasin @ ntu edu sg
stjepan picek @ ru nl
History
2025-02-03: approved
2025-02-02: received
See all versions
Short URL
https://ia.cr/2025/157
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/157,
      author = {Azade Rezaeezade and Trevor Yap and Dirmanto Jap and Shivam Bhasin and Stjepan Picek},
      title = {Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/157},
      year = {2025},
      url = {https://eprint.iacr.org/2025/157}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.