Open Access
Open access

Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations

Publication typeBook Chapter
Publication date2012-07-14
scimago Q2
SJR0.352
CiteScore2.4
Impact factor
ISSN03029743, 16113349, 18612075, 18612083
Abstract
Side-channel attacks have posed serious threats to the physical security of cryptographic implementations. However, the effectiveness of these attacks strongly depends on the accuracy of underlying side-channel leakage characterization. Known leakage characterization models do not always apply into the real scenarios as they are working on some unrealistic assumptions about the leaking devices. In light of this, we propose a back propagation neural network based power leakage characterization attack for cryptographic devices. This attack makes full use of the intrinsic advantage of neural network in profiling non-linear mapping relationship as one basic machine learning tool, transforms the task of leakage profiling into a neural-network-supervised study process. In addition, two new attacks using this model have also been proposed, namely BP-CPA and BP-MIA. In order to justify the validity and accuracy of proposed attacks, we perform a series of experiments and carry out a detailed comparative study of them in multiple scenarios, with twelve typical attacks using mainstream power leakage characterization attacks, the results of which are measured by quantitative metrics such as SR, GE and DL. It has been turned out that BP neural network based power leakage characterization attack can largely improve the effectiveness of the attacks, regardless of the impact of noise and the limited number of power traces. Taking CPA only as one example, BP-CPA is 16.5% better than existing non-linear leakage characterized based attacks with respect to DL, and is 154% better than original CPA.
Found 
Found 

Top-30

Journals

1
2
3
4
5
6
7
8
Lecture Notes in Computer Science
8 publications, 42.11%
IEEE Access
3 publications, 15.79%
Journal of Cryptographic Engineering
2 publications, 10.53%
IEEE Transactions on Computers
2 publications, 10.53%
Lecture Notes in Electrical Engineering
1 publication, 5.26%
Advances in Information Security
1 publication, 5.26%
IEEE Internet of Things Journal
1 publication, 5.26%
1
2
3
4
5
6
7
8

Publishers

2
4
6
8
10
12
Springer Nature
12 publications, 63.16%
Institute of Electrical and Electronics Engineers (IEEE)
7 publications, 36.84%
2
4
6
8
10
12
  • We do not take into account publications without a DOI.
  • Statistics recalculated weekly.

Are you a researcher?

Create a profile to get free access to personal recommendations for colleagues and new articles.
Metrics
19
Share
Cite this
GOST |
Cite this
GOST Copy
Yang S. et al. Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations // Lecture Notes in Computer Science. 2012. pp. 169-185.
GOST all authors (up to 50) Copy
Yang S., Zhou Y., Liu J., Chen D. Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations // Lecture Notes in Computer Science. 2012. pp. 169-185.
RIS |
Cite this
RIS Copy
TY - GENERIC
DO - 10.1007/978-3-642-31912-9_12
UR - https://doi.org/10.1007/978-3-642-31912-9_12
TI - Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations
T2 - Lecture Notes in Computer Science
AU - Yang, Shuguo
AU - Zhou, Yongbin
AU - Liu, Jiye
AU - Chen, Danyang
PY - 2012
DA - 2012/07/14
PB - Springer Nature
SP - 169-185
SN - 0302-9743
SN - 1611-3349
SN - 1861-2075
SN - 1861-2083
ER -
BibTex
Cite this
BibTex (up to 50 authors) Copy
@incollection{2012_Yang,
author = {Shuguo Yang and Yongbin Zhou and Jiye Liu and Danyang Chen},
title = {Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations},
publisher = {Springer Nature},
year = {2012},
pages = {169--185},
month = {jul}
}