Don’t Learn What You Already Know

Scheme-Aware Modeling for Profiling Side-Channel Analysis against Masking

Authors

  • Loïc Masure Crypto Group, Icteam, UCLouvain, Louvain-la-Neuve, Belgium
  • Valence Cristiani Univ. Grenoble Alpes, CEA, Leti, France
  • Maxime Lecomte Univ. Grenoble Alpes, CEA, Leti, France
  • François-Xavier Standaert Crypto Group, Icteam, UCLouvain, Louvain-la-Neuve, Belgium

DOI:

https://doi.org/10.46586/tches.v2023.i1.32-59

Keywords:

Profiling Attacks, Side-Channel, Deep Learning, Gradient Descent, Masking, Scheme-Aware

Abstract

Over the past few years, deep-learning-based attacks have emerged as a de facto standard, thanks to their ability to break implementations of cryptographic primitives without pre-processing, even against widely used counter-measures such as hiding and masking. However, the recent works of Bronchain and Standaert at Tches 2020 questioned the soundness of such tools if used in an uninformed setting to evaluate implementations protected with higher-order masking. On the opposite, worst-case evaluations may be seen as possibly far from what a real-world adversary could do, thereby leading to too conservative security bounds. In this paper, we propose a new threat model that we name scheme-aware benefiting from a trade-off between uninformed and worst-case models. Our scheme-aware model is closer to a real-world adversary, in the sense that it does not need to have access to the random nonces used by masking during the profiling phase like in a worst-case model, while it does not need to learn the masking scheme as implicitly done by an uninformed adversary. We show how to combine the power of deep learning with the prior knowledge of scheme-aware modeling. As a result, we show on simulations and experiments on public datasets how it sometimes allows to reduce by an order of magnitude the profiling complexity, i.e., the number of profiling traces needed to satisfyingly train a model, compared to a fully uninformed adversary.

Downloads

Published

2022-11-29

Issue

Section

Articles

How to Cite

Don’t Learn What You Already Know: Scheme-Aware Modeling for Profiling Side-Channel Analysis against Masking. (2022). IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023(1), 32-59. https://doi.org/10.46586/tches.v2023.i1.32-59