One trace is all it takes

machine learning-based side-channel attack on EDDSA

Conference Paper (2019)
Author(s)

Léo Weissbart (Radboud Universiteit Nijmegen, TU Delft - Cyber Security)

Stjepan Picek (TU Delft - Cyber Security)

Lejla Batina (Radboud Universiteit Nijmegen)

Research Group
Cyber Security
DOI related publication
https://doi.org/10.1007/978-3-030-35869-3_8
More Info
expand_more
Publication Year
2019
Language
English
Research Group
Cyber Security
Pages (from-to)
86-105
ISBN (print)
9783030358686

Abstract

Profiling attacks, especially those based on machine learning proved as very successful techniques in recent years when considering side-channel analysis of block ciphers implementations. At the same time, the results for implementations of public-key cryptosystems are very sparse. In this paper, we consider several machine learning techniques in order to mount a power analysis attack on EdDSA using the curve Curve25519 as implemented in WolfSSL. The results show all considered techniques to be viable and powerful options. Especially convolutional neural networks (CNNs) are effective as we can break the implementation with only a single measurement in the attack phase while requiring less than 500 measurements in the training phase. Interestingly, that same convolutional neural network was recently shown to perform extremely well for attacking the implementation of the AES cipher. Our results show that some common grounds can be established when using deep learning for profiling attacks on distinct cryptographic algorithms and their corresponding implementations.

No files available

Metadata only record. There are no files for this record.