skip to main content
10.1145/3665348.3665374acmotherconferencesArticle/Chapter ViewAbstractPublication PagesgaiisConference Proceedingsconference-collections
research-article
Open access

Side-Channel Analysis of Curve-25519 Based on Deep Learning

Published: 03 July 2024 Publication History

Abstract

This paper explores the integration of deep learning technology with Side-Channel Analysis (SCA) methods to effectively analyze the Curve-25519 algorithm implemented on an MCU chip. The Curve-25519 algorithm, protected by the security features of elliptical curve algorithms and constant-time operations, presents a challenge for low-cost, non-invasive SCA methods due to its robustness. This work focuses on the leakage of conditional judgment operations that occur before each point addition and point doubling operation. By identifying these information leakage points through SCA, electromagnetic radiation and power consumption information are collected and labeled. We conduct a dataset and transformed 1-dimensional signals into a 2D image for training. The trained model is subsequently used for testing. Experiments demonstrate that this method can effectively analyze leakage points in the Curve-25519 algorithm and help to improve the robustness of the algorithm.

References

[1]
Suresh Chari, Josyula R. Rao, and Pankaj Rohatgi. 2002. Template Attacks. Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers.
[2]
Stjepan Picek, Annelie Heuser, Alan Jovic, Simone A. Ludwig, Sylvain Guilley, Domagoj Jakobovic, and Nele Mentens. 2017. Side-channel analysis and machine learning: A practical perspective. International Joint Conference on Neural Networks.
[3]
Zdenek Martinasek, Jan Hajny, and Lukas Malina. 2014. Optimization of Power Analysis Using Neural Network. Smart Card Research and Advanced Application Conference. Springer, Cham, 2013.
[4]
Houssem Maghrebi, Thibault Portigliatti, and Emmanuel Prouff. 2016. Breaking Cryptographic Implementations Using Deep Learning Techniques. IACR Cryptology ePrint Archive, 2016, 2016921
[5]
Eleonora Cagli, Cécile Dumas, and Emmanuel Prouff. 2017. Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures. International Conference on Cryptographic Hardware and Embedded Systems. Springer, Cham, 2017.
[6]
Gabriel Zaid, Lilian Bossuet, Amaury Habrard, and Alexandre Venelli. 2020. Methodology for Efficient CNN Architectures in Profiling Attacks. IACR Transactions on Cryptographic Hardware and Embedded Systems ISSN 2569-2925, Vol. 2020, No. 1, pp. 1-36
[7]
Chang Lipeng, Wei Yuechuan, He Shuiyu, and Pan Xiaozhong. 2022. Research on Side-Channel Analysis Based on Deep Learning with Different Sample Data. Applied Sciences, 2022,12(16):8246-8246
[8]
Li Lang and Ou Yu. 2023. A deep learning-based side channel attack model for different block ciphers. Journal of Computational Science, 2023, 72
[9]
Pascal Sasdrich and Tim Güneysu. 2014. Efficient elliptic-curve cryptography using Curve25519 on reconfigurable devices. International Symposium on Applied Reconfigurable Computing. Springer, Cham, 2014: 25-36.
[10]
Antoine Loiseau, Maxime Lecomte, and Jacques J. A. Fournier. 2020. Template Attacks against ECC: practical implementation against Curve25519. 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[11]
Jaeheon Kim, Je Hong Park, Dong-Chan Kim, and Woo-Hwan Kim. 2019. Complete addition law for Montgomery curves. International Conference on Information Security and Cryptology. Springer, Cham, 2019: 260-277
[12]
Debapriya Basu Roy and Debdeep Mukhopadhyay. 2019. High-speed implementation of ECC scalar multiplication in GF (p) for generic Montgomery curves. IEEE transactions on very large scale integration (VLSI) systems, 2019, 27(7):1587-1600.
[13]
Stefan Mangard. 2002. A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion. 5th International Conference on Information Security and Cryptology ― ICISC 2002, Nov 28-29, 2002, Seoul, Korea. Institute for Applied Information Processing and Communications Graz University of Technology Inffeldgasse 16a, A-8010 Graz, Austria, 2002.
[14]
Kocher Paul, Jaffe Joshua, Jun Benjamin, and Rohatgi Pankaj. 2011. Introduction to differential power analysis. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1(01): 5-27.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
GAIIS '24: Proceedings of the 2024 International Conference on Generative Artificial Intelligence and Information Security
May 2024
439 pages
ISBN:9798400709562
DOI:10.1145/3665348
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 July 2024

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

GAIIS 2024

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 12
    Total Downloads
  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)6
Reflects downloads up to 06 Nov 2024

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media