{"title":"基于条件生成对抗网络的强泄漏模型相关功率分析","authors":"Cheng Tang, Lang Li, Yu Ou","doi":"10.1002/cta.4486","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>Deep learning-based side-channel attacks (DL-SCA) have attracted widespread attention in recent years, and most of the researchers are devoted to finding the optimal DL-SCA method. At the same time, traditional SCA methods have lost their luster. However, traditional attacks still have certain advantages. Compared with the DL-SCA method, they do not require cumbersome engineering of tuning DL models and hyperparameters, making them easier to implement. Correlation power analysis (CPA), as a traditional SCA method, is still widely used in various analysis scenarios and plays an important role. In CPA, the leakage model is the key to simulating the power consumption, and it decides the attack efficiency. However, the existing leakage models are designed based on theory but ignore the actual attack scene. We found that conditional generative adversarial networks (CGAN) can ideally learn the target device's leakage characteristics and real power consumption. We let CGAN pre-learn the leakage of the target device, and then make the generator as the leakage model \n<span></span><math>\n <mi>G</mi></math>. The \n<span></span><math>\n <mi>G</mi></math> leakage model can characterize the leakages of the device and consider the presence of noise in the actual scenario. It can map the power consumption more realistically and accurately, which can lead to a more powerful CPA attack. In this work, three kinds of \n<span></span><math>\n <mi>G</mi></math> leakage models (\n<span></span><math>\n <mi>G</mi></math>1, \n<span></span><math>\n <mi>G</mi></math>2, and \n<span></span><math>\n <mi>G</mi></math>3 leakage models) corresponding to the labels least significant bit (LSB), hamming weight (HW), and identity (ID) of CGAN are discussed. The experimental results show that the \n<span></span><math>\n <mi>G</mi></math>3 leakage model has better attack performance. Compared with the ordinary HW leakage model, the number of traces needed to recover the key on the ASCAD and SAKURA-AES datasets reduced by about 38.9% and 85.9%, respectively.</p>\n </div>","PeriodicalId":13874,"journal":{"name":"International Journal of Circuit Theory and Applications","volume":"53 10","pages":"5851-5861"},"PeriodicalIF":1.6000,"publicationDate":"2025-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Stronger Leakage Model Based on Conditional Generative Adversarial Networks for Correlation Power Analysis\",\"authors\":\"Cheng Tang, Lang Li, Yu Ou\",\"doi\":\"10.1002/cta.4486\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>Deep learning-based side-channel attacks (DL-SCA) have attracted widespread attention in recent years, and most of the researchers are devoted to finding the optimal DL-SCA method. At the same time, traditional SCA methods have lost their luster. However, traditional attacks still have certain advantages. Compared with the DL-SCA method, they do not require cumbersome engineering of tuning DL models and hyperparameters, making them easier to implement. Correlation power analysis (CPA), as a traditional SCA method, is still widely used in various analysis scenarios and plays an important role. In CPA, the leakage model is the key to simulating the power consumption, and it decides the attack efficiency. However, the existing leakage models are designed based on theory but ignore the actual attack scene. We found that conditional generative adversarial networks (CGAN) can ideally learn the target device's leakage characteristics and real power consumption. We let CGAN pre-learn the leakage of the target device, and then make the generator as the leakage model \\n<span></span><math>\\n <mi>G</mi></math>. The \\n<span></span><math>\\n <mi>G</mi></math> leakage model can characterize the leakages of the device and consider the presence of noise in the actual scenario. It can map the power consumption more realistically and accurately, which can lead to a more powerful CPA attack. In this work, three kinds of \\n<span></span><math>\\n <mi>G</mi></math> leakage models (\\n<span></span><math>\\n <mi>G</mi></math>1, \\n<span></span><math>\\n <mi>G</mi></math>2, and \\n<span></span><math>\\n <mi>G</mi></math>3 leakage models) corresponding to the labels least significant bit (LSB), hamming weight (HW), and identity (ID) of CGAN are discussed. The experimental results show that the \\n<span></span><math>\\n <mi>G</mi></math>3 leakage model has better attack performance. Compared with the ordinary HW leakage model, the number of traces needed to recover the key on the ASCAD and SAKURA-AES datasets reduced by about 38.9% and 85.9%, respectively.</p>\\n </div>\",\"PeriodicalId\":13874,\"journal\":{\"name\":\"International Journal of Circuit Theory and Applications\",\"volume\":\"53 10\",\"pages\":\"5851-5861\"},\"PeriodicalIF\":1.6000,\"publicationDate\":\"2025-02-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Circuit Theory and Applications\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/cta.4486\",\"RegionNum\":3,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Circuit Theory and Applications","FirstCategoryId":"5","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/cta.4486","RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
A Stronger Leakage Model Based on Conditional Generative Adversarial Networks for Correlation Power Analysis
Deep learning-based side-channel attacks (DL-SCA) have attracted widespread attention in recent years, and most of the researchers are devoted to finding the optimal DL-SCA method. At the same time, traditional SCA methods have lost their luster. However, traditional attacks still have certain advantages. Compared with the DL-SCA method, they do not require cumbersome engineering of tuning DL models and hyperparameters, making them easier to implement. Correlation power analysis (CPA), as a traditional SCA method, is still widely used in various analysis scenarios and plays an important role. In CPA, the leakage model is the key to simulating the power consumption, and it decides the attack efficiency. However, the existing leakage models are designed based on theory but ignore the actual attack scene. We found that conditional generative adversarial networks (CGAN) can ideally learn the target device's leakage characteristics and real power consumption. We let CGAN pre-learn the leakage of the target device, and then make the generator as the leakage model
. The
leakage model can characterize the leakages of the device and consider the presence of noise in the actual scenario. It can map the power consumption more realistically and accurately, which can lead to a more powerful CPA attack. In this work, three kinds of
leakage models (
1,
2, and
3 leakage models) corresponding to the labels least significant bit (LSB), hamming weight (HW), and identity (ID) of CGAN are discussed. The experimental results show that the
3 leakage model has better attack performance. Compared with the ordinary HW leakage model, the number of traces needed to recover the key on the ASCAD and SAKURA-AES datasets reduced by about 38.9% and 85.9%, respectively.
期刊介绍:
The scope of the Journal comprises all aspects of the theory and design of analog and digital circuits together with the application of the ideas and techniques of circuit theory in other fields of science and engineering. Examples of the areas covered include: Fundamental Circuit Theory together with its mathematical and computational aspects; Circuit modeling of devices; Synthesis and design of filters and active circuits; Neural networks; Nonlinear and chaotic circuits; Signal processing and VLSI; Distributed, switched and digital circuits; Power electronics; Solid state devices. Contributions to CAD and simulation are welcome.