International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning

NOTE: imports for ToSC and TCHES are no longer functioning.

Authors:
Elie Bursztein
Luca Invernizzi
Karel Král
Daniel Moghimi
Jean-Michel Picod
Marina Zhang
Download:
DOI: 10.46586/tches.v2024.i3.472-499
URL: https://tches.iacr.org/index.php/TCHES/article/view/11685
Search ePrint
Search Google
Abstract: To make cryptographic processors more resilient against side-channel attacks, engineers have developed various countermeasures. However, the effectiveness of these countermeasures is often uncertain, as it depends on the complex interplay between software and hardware. Assessing a countermeasure’s effectiveness using profiling techniques or machine learning so far requires significant expertise and effort to be adapted to new targets which makes those assessments expensive. We argue that including cost-effective automated attacks will help chip design teams to quickly evaluate their countermeasures during the development phase, paving the way to more secure chips.In this paper, we lay the foundations toward such automated system by proposing GPAM, the first deep-learning system for power side-channel analysis that generalizes across multiple cryptographic algorithms, implementations, and side-channel countermeasures without the need for manual tuning or trace preprocessing. We demonstrate GPAM’s capability by successfully attacking four hardened hardware-accelerated elliptic-curve digital-signature implementations. We showcase GPAM’s ability to generalize across multiple algorithms by attacking a protected AES implementation and achieving comparable performance to state-of-the-art attacks, but without manual trace curation and within a limited budget. We release our data and models as an open-source contribution to allow the community to independently replicate our results and build on them.
BibTeX
@article{tches-2024-34449,
  title={Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning},
  journal={IACR Transactions on Cryptographic Hardware and Embedded Systems},
  publisher={Ruhr-Universität Bochum},
  volume={2024},
  pages={472-499},
  url={https://tches.iacr.org/index.php/TCHES/article/view/11685},
  doi={10.46586/tches.v2024.i3.472-499},
  author={Elie Bursztein and Luca Invernizzi and Karel Král and Daniel Moghimi and Jean-Michel Picod and Marina Zhang},
  year=2024
}