Single-Trace Attack Using One-Shot Learning With Siamese Network in Non-Profiled Settingopen access
- Authors
- Lee, Nayeon; Hong, Seokhie; Kim, Heeseok
- Issue Date
- 2022
- Publisher
- IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
- Keywords
- Side-channel attacks; Deep learning; Training; Training data; Prediction algorithms; Noise measurement; Licenses; Deep learning; ECC; Montgomery ladder; non-profiling attack; one-shot learning; side channel attack; Siamese network; similarity score
- Citation
- IEEE ACCESS, v.10, pp 60778 - 60789
- Pages
- 12
- Indexed
- SCIE
SCOPUS
- Journal Title
- IEEE ACCESS
- Volume
- 10
- Start Page
- 60778
- End Page
- 60789
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/143258
- DOI
- 10.1109/ACCESS.2022.3180742
- ISSN
- 2169-3536
- Abstract
- Recently, many studies have shown that using deep learning for side-channel attacks offers several advantages, including simplification of the attack phase and target breaking, even in protected implementations, while presenting outstanding attack performance. Power and electromagnetic analysis, which is known as the most robust attack, can be classified into profiling and non-profiling attacks. In the real world, a non-profiling attack is more ideal than a profiling attack. In particular, studies on non-profiling attacks using deep learning for asymmetric cryptosystems are rare and have shortcomings, such as a long analysis time. In this paper, we propose a novel non-profiling attack method for asymmetric cryptosystems that requires only a single trace and a reasonably short attack time to recover a full private key, overcoming the limitations of previous studies. The proposed method applies one-shot learning with a convolutional Siamese network, which is used for the first time in side-channel attacks. Thus, our proposed method can leak private keys used in a protected public-key cryptosystem with up to 100% accuracy with only one single trace in a non-profiled setting.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
- Graduate School > Department of Cyber Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.