Presentation | 2021-10-19 A Deep-Learning Based Single-Trace Side-Channel Attack on Tamper-Resistant CRT-RSA Software Kotaro Saito, Akira Ito, Rei Ueno, Naofumi Homma, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | This paper proposes a deep-learning based single-trace side-channel attack on CRT-RSA software implementation secure against simple power analysis (SPA).We focus on a CRT-RSA implementation with an open-source software library named Gnu MP, which employs the fixed window (FW) exponentiation with a hiding countermeasure based on a dummy load for the sake of SPA resistance. The FW exponentiation is known as the fastest, constant-time, and SPA-resistant modular exponentiation algorithm. In addition, dummy load in selecting a multiplicand is utilized to mitigate more sophisticated power analysis/cache attacks. We propose a novel single-trace power analysis attack on the basis of deep learning to estimate the secret exponents from FW exponentiation exploiting dummy load with a convincing accuracy. Furthermore, we extend the partial key exposure attack on CRT-RSA such that it can exploit the feature of key exposure estimated by the above analysis. We experimentally demonstrate that secret keys of the CRT-RSA can be easily recovered even when the estimated exponents contain some errors. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Side-Channel Attack / Deep-Learning / CRT-RSA / Partial Key Exposure Attack / Gnu MP |
Paper # | HWS2021-42,ICD2021-16 |
Date of Issue | 2021-10-12 (HWS, ICD) |
Conference Information | |
Committee | HWS / ICD |
---|---|
Conference Date | 2021/10/19(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | Online |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | Hardware Security, etc. |
Chair | Yasuhisa Shimazaki(Renesas Electronics) / Masafumi Takahashi(Kioxia) |
Vice Chair | Makoto Nagata(Kobe Univ.) / Daisuke Suzuki(Mitsubishi Electric) / Makoto Ikeda(Univ. of Tokyo) |
Secretary | Makoto Nagata(NTT) / Daisuke Suzuki(NAIST) / Makoto Ikeda(Osaka Univ.) |
Assistant | / Kosuke Miyaji(Shinshu Univ.) / Yoshiaki Yoshihara(キオクシア) / Takeshi Kuboki(Kyushu Univ.) |
Paper Information | |
Registration To | Technical Committee on Hardware Security / Technical Committee on Integrated Circuits and Devices |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | A Deep-Learning Based Single-Trace Side-Channel Attack on Tamper-Resistant CRT-RSA Software |
Sub Title (in English) | |
Keyword(1) | Side-Channel Attack |
Keyword(2) | Deep-Learning |
Keyword(3) | CRT-RSA |
Keyword(4) | Partial Key Exposure Attack |
Keyword(5) | Gnu MP |
1st Author's Name | Kotaro Saito |
1st Author's Affiliation | Tohoku University(Tohoku Univ.) |
2nd Author's Name | Akira Ito |
2nd Author's Affiliation | Tohoku University(Tohoku Univ.) |
3rd Author's Name | Rei Ueno |
3rd Author's Affiliation | Tohoku University(Tohoku Univ.) |
4th Author's Name | Naofumi Homma |
4th Author's Affiliation | Tohoku University(Tohoku Univ.) |
Date | 2021-10-19 |
Paper # | HWS2021-42,ICD2021-16 |
Volume (vol) | vol.121 |
Number (no) | HWS-206,ICD-207 |
Page | pp.pp.7-12(HWS), pp.7-12(ICD), |
#Pages | 6 |
Date of Issue | 2021-10-12 (HWS, ICD) |