Neural Network Based Attack on a Masked Implementation of AES


Autoria(s): Gilmore, Richard; Hanley, Neil; O'Neill, Maire
Data(s)

07/05/2015

Resumo

Masked implementations of cryptographic algorithms are often used in commercial embedded cryptographic devices to increase their resistance to side channel attacks. In this work we show how neural networks can be used to both identify the mask value, and to subsequently identify the secret key value with a single attack trace with high probability. We propose the use of a pre-processing step using principal component analysis (PCA) to significantly increase the success of the attack. We have developed a classifier that can correctly identify the mask for each trace, hence removing the security provided by that mask and reducing the attack to being equivalent to an attack against an unprotected implementation. The attack is performed on the freely available differential power analysis (DPA) contest data set to allow our work to be easily reproducible. We show that neural networks allow for a robust and efficient classification in the context of side-channel attacks.

Identificador

http://pure.qub.ac.uk/portal/en/publications/neural-network-based-attack-on-a-masked-implementation-of-aes(60ab1f60-ba06-498b-a543-6c5c3369d83a).html

http://dx.doi.org/10.1109/HST.2015.7140247

Idioma(s)

eng

Publicador

Institute of Electrical and Electronics Engineers (IEEE)

Direitos

info:eu-repo/semantics/restrictedAccess

Fonte

Gilmore , R , Hanley , N & O'Neill , M 2015 , Neural Network Based Attack on a Masked Implementation of AES . in 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), . Institute of Electrical and Electronics Engineers (IEEE) , pp. 106-11 , IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) , United Kingdom , 5-7 May . DOI: 10.1109/HST.2015.7140247

Tipo

contributionToPeriodical