z-logo
open-access-imgOpen Access
Boosting the efficacy of power attacks on cryptographic circuits with autoencoder
Author(s) -
Wen Yiming,
Yu Weize
Publication year - 2019
Publication title -
electronics letters
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.375
H-Index - 146
ISSN - 1350-911X
DOI - 10.1049/el.2019.2463
Subject(s) - boosting (machine learning) , autoencoder , cryptography , computer science , electronic circuit , power (physics) , computer security , electrical engineering , artificial intelligence , engineering , deep learning , physics , quantum mechanics
Power attacks are able to leak the secret key of protected cryptographic circuits as long as the number of sampled power data is sufficient to filter the injected noise. However, in this Letter, a novel power attack is proposed to break protected cryptographic circuits when the number of available power data is inadequate for filtering the injected noise. To achieve this goal, a state‐of‐the‐art machine learning technique: autoencoder is utilised for generating a certain number of new power data that are similar to the original power data to assist the noise filtering. Within the proposed autoencoder neural networks, the input and output layers are set with 1024 × 1 arrays. Furthermore, two convolution layers are used in the encoder block and decoder block, respectively, to achieve similar features between the input layer and the output layer. Under the assistance of autoencoder, the novel power attack reveals the secret key of a protected cryptographic circuit with 300,000 power data. In contrast, the regular power attacks fail to break the cryptographic circuit under the same number of power data.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom