Visible to the public Software Implementation of AES-128: Side Channel Attacks Based on Power Traces Decomposition

TitleSoftware Implementation of AES-128: Side Channel Attacks Based on Power Traces Decomposition
Publication TypeConference Paper
Year of Publication2022
AuthorsHu, Fanliang, Ni, Feng
Conference Name2022 International Conference on Cyber Warfare and Security (ICCWS)
Date Publisheddec
KeywordsAES, composability, Data models, decomposition, Deep Learning, Human Behavior, Metrics, microcontrollers, performance evaluation, power analysis, Power trace decomposition, pubcrawl, side channel attacks, side-channel attacks, Software, Training
AbstractSide Channel Attacks (SCAs), an attack that exploits the physical information generated when an encryption algorithm is executed on a device to recover the key, has become one of the key threats to the security of encrypted devices. Recently, with the development of deep learning, deep learning techniques have been applied to SCAs with good results on publicly available dataset experiences. In this paper, we propose a power traces decomposition method that divides the original power traces into two parts, where the data-influenced part is defined as data power traces (Tdata) and the other part is defined as device constant power traces, and use the Tdata for training the network model, which has more obvious advantages than using the original power traces for training the network model. To verify the effectiveness of the approach, we evaluated the ATXmega128D4 microcontroller by capturing the power traces generated when implementing AES-128. Experimental results show that network models trained using Tdata outperform network models trained using raw power traces (Traw ) in terms of classification accuracy, training time, cross-subkey recovery key, and cross-device recovery key.
DOI10.1109/ICCWS56285.2022.9998437
Citation Keyhu_software_2022