计算机科学
旁道攻击
分组密码
密码系统
实施
功率分析
卷积神经网络
密码学
仿形(计算机编程)
深度学习
公钥密码术
AES实现
人工智能
机器学习
计算机工程
理论计算机科学
算法
计算机安全
加密
高级加密标准
操作系统
程序设计语言
作者
Leo Weissbart,Stjepan Picek,Lejla Batina
标识
DOI:10.1007/978-3-030-35869-3_8
摘要
Profiling attacks, especially those based on machine learning proved as very successful techniques in recent years when considering side-channel analysis of block ciphers implementations. At the same time, the results for implementations of public-key cryptosystems are very sparse. In this paper, we consider several machine learning techniques in order to mount a power analysis attack on EdDSA using the curve Curve25519 as implemented in WolfSSL. The results show all considered techniques to be viable and powerful options. Especially convolutional neural networks (CNNs) are effective as we can break the implementation with only a single measurement in the attack phase while requiring less than 500 measurements in the training phase. Interestingly, that same convolutional neural network was recently shown to perform extremely well for attacking the implementation of the AES cipher. Our results show that some common grounds can be established when using deep learning for profiling attacks on distinct cryptographic algorithms and their corresponding implementations.
科研通智能强力驱动
Strongly Powered by AbleSci AI