[go: up one dir, main page]

What a lovely hat

Is it made out of tin foil?

Paper 2022/1476

The EVIL Machine: Encode, Visualize and Interpret the Leakage

Valence Cristiani, CEA LETI
Maxime Lecomte, CEA LETI
Philippe Maurine, LIRMM
Abstract

Unsupervised side-channel attacks allow extracting secret keys manipulated by cryptographic primitives through leakages of their physical implementations. As opposed to supervised attacks, they do not require a preliminary profiling of the target, constituting a broader threat since they imply weaker assumptions on the adversary model. Their downside is their requirement for some a priori knowledge on the leakage model of the device. On one hand, stochastic attacks such as the Linear Regression Analysis (LRA) allow for a flexible a priori, but are mostly limited to a univariate treatment of the traces. On the other hand, model-based attacks require an explicit formulation of the leakage model but have recently been extended to multidimensional versions allowing to benefit from the potential of Deep Learning (DL) techniques. The EVIL Machine Attack (EMA), introduced in this paper, aims at taking the best of both worlds. Inspired by generative adversarial networks, its architecture is able to recover a representation of the leakage model, which is then turned into a key distinguisher allowing flexible a priori. In addition, state-of-the-art DL techniques require 256 network trainings to conduct the attack. EMA requires only one, scaling down the time complexity of such attacks by a considerable factor. Simulations and real experiments show that EMA is applicable in cases where the adversary has very low knowledge on the leakage model, while significantly reducing the required number of traces compared to a classical LRA. Eventually, a generalization of EMA, able to deal with masked implementation is introduced.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Side channel analysis Mutual information Deep learning Leakage Model Generative Adversarial Networks
Contact author(s)
valencecristiani @ gmail com
maxime lecomte @ cea fr
pmaurine @ lirmm fr
History
2022-10-28: approved
2022-10-27: received
See all versions
Short URL
https://ia.cr/2022/1476
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2022/1476,
      author = {Valence Cristiani and Maxime Lecomte and Philippe Maurine},
      title = {The {EVIL} Machine: Encode, Visualize and Interpret the Leakage},
      howpublished = {Cryptology {ePrint} Archive, Paper 2022/1476},
      year = {2022},
      url = {https://eprint.iacr.org/2022/1476}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.