Systematic Side-Channel Analysis of Curve25519 with Machine Learning

Journal Article (2020)
Author(s)

Léo Weissbart (Radboud Universiteit Nijmegen)

Łukasz Chmielewski (Radboud Universiteit Nijmegen, Riscure)

Stjepan Picek (TU Delft - Cyber Security)

Lejla Batina (Radboud Universiteit Nijmegen)

Research Group
Cyber Security
Copyright
© 2020 L.J.A. Weissbart, Łukasz Chmielewski, S. Picek, Lejla Batina
DOI related publication
https://doi.org/10.1007/s41635-020-00106-w
More Info
expand_more
Publication Year
2020
Language
English
Copyright
© 2020 L.J.A. Weissbart, Łukasz Chmielewski, S. Picek, Lejla Batina
Research Group
Cyber Security
Volume number
4
Pages (from-to)
314–328
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Profiling attacks, especially those based on machine learning, proved to be very successful techniques in recent years when considering the side-channel analysis of symmetric-key crypto implementations. At the same time, the results for implementations of asymmetric-key cryptosystems are very sparse. This paper considers several machine learning techniques to mount side-channel attacks on two implementations of scalar multiplication on the elliptic curve Curve25519. The first implementation follows the baseline implementation with complete formulae as used for EdDSA in WolfSSl, where we exploit power consumption as a side-channel. The second implementation features several countermeasures, and in this case, we analyze electromagnetic emanations to find side-channel leakage. Most techniques considered in this work result in potent attacks, and especially the method of choice appears to be convolutional neural networks (CNNs), which can break the first implementation with only a single measurement in the attack phase. The same convolutional neural network demonstrated excellent performance for attacking AES cipher implementations. Our results show that some common grounds can be established when using deep learning for profiling attacks on very different cryptographic algorithms and their corresponding implementations.