ANALYZING AES POWER TRACES FOR SIDE-CHANNEL ATTACK: GENERATION, CLASSIFICATION, KEY DEDUCTION, AND MITIGATION STRATEGIES
dc.contributor.author | Rajeev, Keerthana | |
dc.contributor.copyright-release | Not Applicable | en_US |
dc.contributor.degree | Master of Computer Science | en_US |
dc.contributor.department | Faculty of Computer Science | en_US |
dc.contributor.ethics-approval | Not Applicable | en_US |
dc.contributor.external-examiner | n/a | en_US |
dc.contributor.manuscripts | Not Applicable | en_US |
dc.contributor.thesis-reader | Yujie Tang | en_US |
dc.contributor.thesis-reader | Jaume Manero | en_US |
dc.contributor.thesis-supervisor | Srini Sampalli | en_US |
dc.date.accessioned | 2024-08-07T17:35:58Z | |
dc.date.available | 2024-08-07T17:35:58Z | |
dc.date.defence | 2024-07-29 | |
dc.date.issued | 2024-08-06 | |
dc.description | This research focuses on identifying vulnerabilities in the Advanced Encryption Standard (AES) algorithm exposed by side-channel attacks (SCAs). It involves generating real and synthetic power traces, classifying these traces, and deducing cryptographic keys using deep learning techniques. Additionally, the study explores various mitigation strategies to combat SCAs. | en_US |
dc.description.abstract | Side-channel attacks (SCAs) exploit leakages from a system’s physical implementation, like acoustic signals, electromagnetic, and power emissions, to deduce sensitive information, thus bypassing traditional security measures. SCAs appeal to hackers due to their non-invasive nature and low cost and thereby necessitate robust countermeasures. The Advanced Encryption Standard (AES) is a widely used symmetric key cryptography known for its robustness, but it remains susceptible to SCAs. This research analyzes power traces to identify vulnerabilities, classifies power traces based on AES implementation, employs Deep Learning(DL) models to deduce cryptographic keys, and develops mitigation strategies against SCAs. We generated and analyzed real and synthetic power traces from masked AES implementations using a Syscomp waveform generator and a Python script. Techniques like Fast Fourier Transform (FFT), Wavelet transform, and linear regression were used to correlate the traces. Power traces from the AES Power Trace (AES PT) dataset were classified into three AES implementations using feature extraction techniques and Support Vector Machine (SVM) classification based on statistical properties from Principal component analysis (PCA).We used hashing and metadata techniques retrieved original power traces from the feature set. The study used ANSSI Side-channel Analysis Database (ASCAD) and adopted deep learning models for key deduction: Residual Networks were transformed into ResTraceNet using 1D convolutional layers, and Gated Recurrent Units (GRUs) were modified into GRUTrace to process 1D power traces. These models deduced one key byte using only 100 power traces, achieving testing accuracies of 96.68% and 96.28%. We proposed a mitigation strategy involving structured masking and Gaussian noise to obscure relationships between cryptographic keys and power consumption patterns. Our proposed research provides a comprehensive analysis of AES power traces, using DL models to perform feature extraction, classify and deduce cryptographic keys, and proposes mitigation techniques to enhance defenses against SCAs. | en_US |
dc.identifier.uri | http://hdl.handle.net/10222/84387 | |
dc.language.iso | en | en_US |
dc.subject | Advanced Encryption Standard | en_US |
dc.subject | Side-channel attacks | en_US |
dc.subject | Deep learning | en_US |
dc.title | ANALYZING AES POWER TRACES FOR SIDE-CHANNEL ATTACK: GENERATION, CLASSIFICATION, KEY DEDUCTION, AND MITIGATION STRATEGIES | en_US |