A backpropagation extreme learning machine approach to fast training neural network-based side-channel attack
In recent years, many side-channel attack (SCA) based on deep learning have emerged, making it possible to break protected encryption algorithms. How- ever, since the training of deep learning is based on back-propagation, a long training time is required. In deep learning SCA, because of the encryp...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Thesis-Master by Coursework |
Language: | English |
Published: |
Nanyang Technological University
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/154903 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Summary: | In recent years, many side-channel attack (SCA) based on deep learning have emerged, making it possible to break protected encryption algorithms. How- ever, since the training of deep learning is based on back-propagation, a long training time is required. In deep learning SCA, because of the encryption algorithm, it is common to train multiple models based on the number of subkeys in one time attack, so the training time is multiplied as a drawback of DL- SCA. This work presented new Deep learning Side-channel Attack (DL-SCA) models that are based on Extreme Learning Machine (ELM). Unlike the conventional iterative backpropagation method, ELM is a fast learning algorithm that computes the trainable weights within a single iteration. Two models (Ensemble bpELM and CAE-ebpELM) are designed to perform SCA on AES with Boolean masking and desynchronization/jittering. The best models for both at- tack tasks can be trained 27× faster than MLP and 5× faster than CNN respectively. Verified and validated using ASCAD dataset, our models successfully recover all 16 subkeys using approximately 3K traces in the worst case scenario. |
---|