Profiled side channel attacks against the RSA cryptosystem using neural networks

Journal of Information Security and Applications(2022)

引用 1|浏览18
暂无评分
摘要
Profiled attacks employing machine learning techniques for secret information extraction are currently one of the main interests of the research community working on side channel attacks. In this work, we tackle the use of machine learning methods to perform a power consumption based side channel attack against asymmetric cryptosystems. In particular, we analyze different machine-learning based strategies to retrieve the secret exponent from a square-and-multiply-always modular exponentiation in RSA cryptosystem software implementations. We validate our proposals conducting effective attacks against the modular exponentiation contained in the BearSSL software library, a timing side-channel hardened public library. The experimental validation shows that our attack strategy improves the state-of-art solution and is able to retrieve the correct exponent value with a single trace from the attacked device, and, in the worst case, with an exhaustive search in a set of candidates containing a few hundred possible values for the sought secret.
更多
查看译文
关键词
68P25,11T71
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要