Non-profiled Deep-Learning-Based Power Analysis of the SM4 and DES Algorithms

来源 :电子学报(英文版) | 被引量 : 0次 | 上传用户:charoltte8816
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Power analysis methods are commonly used for evaluating the security of cryptographic devices. They are characteristically low-cost and display a high success rate and the ability to obtain important device information, e.g., keys. Given the current wide application of deep-learning technology, there is a growing tendency to incorporate power-analysis technology in development. This study investigates non-profiled deep-learning-based power analysis. The labels used in this attack are uncertain, and the attack conditions required are greatly reduced. We choose the Recurrent neural network (RNN), multilayer perceptron, and convolutional neural network algorithms, which use the same network structure, to recover the keys for the SM4 software and DES hardware implementations. We propose combining the RNN algorithm with power analysis, and validate the benefits experimentally. The experimental results show that they all successfully recover the correct key for the SM4 software implementation, although the RNN algorithm by itself achieves a better effect. This conclusion also applies to attacks on the DES hardware implementation but is limited to labels based on the bit model.
其他文献
In this paper, we propose a fully automatic mesh segmentation method, which divides meshes into sub-meshes recursively through spectral analysis. A common problem in the spectral analysis of geometric
In this paper, based on a result of Lidl and Mullen (Mathematical Journal of Okayama University, 1991), the maximum length and the second maximum length that ca
An algorithm for output spectrum analysis of nonlinear system with correlative sources is proposed. First, the output terms of nonlinear system are analyzed bas
Automated human facial image deidentification is a much-needed technology for privacypreserving social media and intelligent surveillance applications. We propose a novel utility preserved facial imag
Service-based architecture (SBA) is a profound advancement in the novel 5G Core network (5GC). Existing studies show that SBA can benefit from cloud computing t
Network on a chip (NoC) uses packet-switched network to implement interconnections in System on chip (SoC). In SoC design, performance and energy efficiency are
Inspired by the self-similar fractal proper-ties of chaotic attractors and the heuristics of similarity filtering of images, a novel chaotic signal denoising al
In order to reduce the volume, weight and cost of conventional hybrid energy storage system (HESS) while properly exploring the complementary features of differ
Automatic identification of intracranial electroencephalogram (iEEG) signals has become more and more important in the field of medical diagnostics. In this pap
Electric drive system with Insulated gate bipolar transistor (IGBT) power device is widely used in Electric vehicle (EV), which consists of inverter, cables and