Deep Learning-based Side Channel Attack on HMAC SM3.
DOI:
https://doi.org/10.9781/ijimai.2020.11.007Keywords:
Convolutional Neural Network (CNN), HMAC, Side Channel AnalysisAbstract
SM3 is a Chinese hash standard. HMAC SM3 uses a secret key to encrypt the input text and gives an output as the HMAC of the input text. If the key is recovered, adversaries can easily forge a valid HMAC. We can choose different methods, such as traditional side channel analysis, template attack-based side channel analysis to recover the secret key. Deep Learning has recently been introduced as a new alternative to perform Side-Channel analysis. In this paper, we try to recover the secret key with deep learning-based side channel analysis. We should train the network recursively for different parameters by using the same dataset and attack the target dataset with the trained network to recover different parameters. The experiment results show that the secret key can be recovered with deep learning-based side channel analysis. This work demonstrates the interests of this new method and show that this attack can be performed in practice.
Downloads
References
[1] Kocher P, Jaffe J, Jun B. “Differential power analysis, advances in cryptology”-CRYPTO’99, Proc.19th Annual International Cryptology Conf, pp. 388-397, 1999.
[2] Gandolfi K, Mourtel C, Olivier F. “Electromagnetic analysis: Concrete results”, International workshop on cryptographic hardware and embedded systems. Springer, Berlin, Heidelberg, pp. 251-261, 2001.
[3] Brouchier J, Kean T, Marsh C, et al. “Temperature attacks.” IEEE Security & Privacy, vol. 7, no. 2, pp. 79-82, 2009.
[4] Thompson, J.N. “Insect Diversity and the Trophic Structure of Communities”. In: Ecological Entomology. New York. pp. 165-178, 1994.
[5] Robyns, Pieter, Peter Quax, and Wim Lamotte. “Improving CEMA using correlation optimization.”, 2018.
[6] Krizhevsky, Alex, Ilya Sutskever, and Geoffrey E. Hinton. “Imagenet classification with deep convolutional neural networks.” Advances in neural information processing systems, 2012.
[7] Simonyan, Karen, and Andrew Zisserman. “Very deep convolutional networks for large-scale image recognition.” arXiv preprint arXiv: pp. 1409-1556, 2014.
[8] Szegedy, Christian, et al. “Going deeper with convolutions.” Proceedings of the IEEE conference on computer vision and pattern recognition, 2015.
[9] He, Kaiming, et al. “Deep residual learning for image recognition.” Proceedings of the IEEE conference on computer vision and pattern recognition, 2016.
[10] Bartkewitz T, Lemke-Rust K. “Efficient template attacks based on probabilistic multi-class support vector machines”, International Conference on Smart Card Research and Advanced Applications. Springer, Berlin, Heidelberg, pp. 263-276, 2015.
[11] Heuser A, Zohner M. “Intelligent machine homicide”, International Workshop on Constructive Side-Channel Analysis and Secure Design. Springer, Berlin, Heidelberg, pp. 249-264, 2012.
[12] Prouff, Emmanuel, et al. “Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database.” IACR Cryptology ePrint Archive, vol. 53, 2018.
[13] Martinasek, Zdenek, and Vaclav Zeman. “Innovative method of the power analysis.” Radio engineering, vol. 22.2, pp. 586-594, 2013.
[14] Maghrebi, Houssem, Thibault Portigliatti, a nd Emmanuel Prouff. “Breaking cryptographic implementations using deep learning techniques.” International Conference on Security, Privacy, and Applied Cryptography Engineering. Springer, Cham, 2016.
[15] Cagli, Eleonora, Cécile Dumas, and Emmanuel Prouff. “Convolutional neural networks with data augmentation against jitter-based countermeasures.” International Conference on Cryptographic Hardware and Embedded Systems. Springer, Cham, 2017.
[16] Picek, Stjepan, et al. “The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations.” IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018.
[17] Robyns, Pieter, Peter Quax, and Wim Lamotte. “Improving CEMA using correlation optimization.” IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2019, no. 1, pp. 1-24, 2018. Doi: 10.13154/tches.v2019.i1.1-24
[18] China’s Office of Security Commercial Code Administration: Specification of SM3 Cryptographic Hash Function, http://www.oscca.gov.cn/UpFile/20101222141857786.Pdf,2010.
[19] Turner, James M. “The keyed-hash message authentication code (HMAC).” Federal Information Processing Standards Publication, vol. 198-1, 2008.
[20] Chari S, Rao J R, Rohatgi P. “Template attacks”, International Workshop on Cryptographic Hardware and Embedded Systems. Springer, Berlin, Heidelberg, pp. 13-28, 2002.
[21] O’Shea K, Nash R. “An introduction to convolutional neural networks”, arXiv preprint arXiv:1511.08458, 2015.
[22] Kocher P C. “Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems”, Annual International Cryptology Conference. Springer, Berlin, Heidelberg, pp. 104-113, 1996.
[23] Mayer-Sommer R. “Smartly analyzing the simplicity and the power of simple power analysis on smartcards”, International Workshop on Cryptographic Hardware and Embedded Systems. Springer, Berlin, Heidelberg, pp. 78-92, 2002.
[24] Brier E, Clavier C, Olivier F. “Correlation power analysis with a leakage model”, International workshop on cryptographic hardware and embedded systems. Springer, Berlin, Heidelberg, pp. 16-29, 2004.
Downloads
Published
-
Abstract215
-
PDF40






