Paper 2023/1563

Formal Analysis of Non-profiled Deep-learning Based Side-channel Attacks

Akira Ito, NTT Social Informatics Laboratories
Rei Ueno, Tohoku University
Rikuma Tanaka, Tohoku University
Naofumi Homma, Tohoku University
Abstract

This paper formally analyzes two major non-profiled deep-learning-based side-channel attacks (DL-SCAs): differential deep-learning analysis (DDLA) by Timon and collision DL-SCA by Staib and Moradi. These DL-SCAs leverage supervised learning in non-profiled scenarios. Although some intuitive descriptions of these DL-SCAs exist, their formal analyses have been rarely conducted yet, which makes it unclear why and when the attacks succeed and how the attack can be improved. In this paper, we provide the first information-theoretical analysis of DDLA. We reveal its relevance to the mutual information analysis (MIA), and then present three theorems stating some limitations and impossibility results of DDLA. Subsequently, we provide the first probability-theoretical analysis on collision DL-SCA. After presenting its formalization with a proposal of our distinguisher for collision DL-SCA, we prove its optimality. Namely, we prove that the collision DL-SCA using our distinguisher theoretically maximizes the success rate if the neural network (NN) training is completely successful (namely, the NN completely imitates the true conditional probability distribution). Accordingly, we propose an improvement of the collision DL-SCA based on a dedicated NN architecture and a full-key recovery methodology using multiple neural distinguishers. Finally, we experimentally evaluate non-profiled (DL-)SCAs using a newly created dataset using publicly available first-order masked AES implementation. The existing public dataset of side-channel traces is insufficient to evaluate collision DL-SCAs due to a lack of substantive side-channel traces for different key values. Our dataset enables a comprehensive evaluation of collision (DL-)SCAs, which clarifies the current situation of non-profiled (DL-)SCAs.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Side-channel attacksCollision SCAsDeep learningNon-profiled atacksOptimal distinguisherSymmetric cihper
Contact author(s)
akira itoh @ ntt com
rei ueno a8 @ tohoku ac jp
rikuma tanaka q1 @ dc tohoku ac jp
naofumi homma c8 @ tohoku ac jp
History
2023-10-17: revised
2023-10-11: received
See all versions
Short URL
https://ia.cr/2023/1563
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/1563,
      author = {Akira Ito and Rei Ueno and Rikuma Tanaka and Naofumi Homma},
      title = {Formal Analysis of Non-profiled Deep-learning Based Side-channel Attacks},
      howpublished = {Cryptology {ePrint} Archive, Paper 2023/1563},
      year = {2023},
      url = {https://eprint.iacr.org/2023/1563}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.