Presentation 2021-10-19
A Deep-Learning Based Single-Trace Side-Channel Attack on Tamper-Resistant CRT-RSA Software
Kotaro Saito, Akira Ito, Rei Ueno, Naofumi Homma,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) This paper proposes a deep-learning based single-trace side-channel attack on CRT-RSA software implementation secure against simple power analysis (SPA).We focus on a CRT-RSA implementation with an open-source software library named Gnu MP, which employs the fixed window (FW) exponentiation with a hiding countermeasure based on a dummy load for the sake of SPA resistance. The FW exponentiation is known as the fastest, constant-time, and SPA-resistant modular exponentiation algorithm. In addition, dummy load in selecting a multiplicand is utilized to mitigate more sophisticated power analysis/cache attacks. We propose a novel single-trace power analysis attack on the basis of deep learning to estimate the secret exponents from FW exponentiation exploiting dummy load with a convincing accuracy. Furthermore, we extend the partial key exposure attack on CRT-RSA such that it can exploit the feature of key exposure estimated by the above analysis. We experimentally demonstrate that secret keys of the CRT-RSA can be easily recovered even when the estimated exponents contain some errors.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Side-Channel Attack / Deep-Learning / CRT-RSA / Partial Key Exposure Attack / Gnu MP
Paper # HWS2021-42,ICD2021-16
Date of Issue 2021-10-12 (HWS, ICD)

Conference Information
Committee HWS / ICD
Conference Date 2021/10/19(1days)
Place (in Japanese) (See Japanese page)
Place (in English) Online
Topics (in Japanese) (See Japanese page)
Topics (in English) Hardware Security, etc.
Chair Yasuhisa Shimazaki(Renesas Electronics) / Masafumi Takahashi(Kioxia)
Vice Chair Makoto Nagata(Kobe Univ.) / Daisuke Suzuki(Mitsubishi Electric) / Makoto Ikeda(Univ. of Tokyo)
Secretary Makoto Nagata(NTT) / Daisuke Suzuki(NAIST) / Makoto Ikeda(Osaka Univ.)
Assistant / Kosuke Miyaji(Shinshu Univ.) / Yoshiaki Yoshihara(キオクシア) / Takeshi Kuboki(Kyushu Univ.)

Paper Information
Registration To Technical Committee on Hardware Security / Technical Committee on Integrated Circuits and Devices
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Deep-Learning Based Single-Trace Side-Channel Attack on Tamper-Resistant CRT-RSA Software
Sub Title (in English)
Keyword(1) Side-Channel Attack
Keyword(2) Deep-Learning
Keyword(3) CRT-RSA
Keyword(4) Partial Key Exposure Attack
Keyword(5) Gnu MP
1st Author's Name Kotaro Saito
1st Author's Affiliation Tohoku University(Tohoku Univ.)
2nd Author's Name Akira Ito
2nd Author's Affiliation Tohoku University(Tohoku Univ.)
3rd Author's Name Rei Ueno
3rd Author's Affiliation Tohoku University(Tohoku Univ.)
4th Author's Name Naofumi Homma
4th Author's Affiliation Tohoku University(Tohoku Univ.)
Date 2021-10-19
Paper # HWS2021-42,ICD2021-16
Volume (vol) vol.121
Number (no) HWS-206,ICD-207
Page pp.pp.7-12(HWS), pp.7-12(ICD),
#Pages 6
Date of Issue 2021-10-12 (HWS, ICD)