{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:12:30Z","timestamp":1770228750532,"version":"3.49.0"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T00:00:00Z","timestamp":1679875200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T00:00:00Z","timestamp":1679875200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"JSPS KAKENHI","award":["22H03593"],"award-info":[{"award-number":["22H03593"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2023,11]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Deep-learning side-channel attacks, applying deep neural networks to side-channel attacks, are known that can easily attack some existing side-channel attack countermeasures such as masking and random jitter. While there have been many studies on profiled deep-learning side-channel attacks, a new approach that involves applying deep learning to non-profiled attacks was proposed in 2018. In our study, we investigate the structure of multi-layer perceptrons and points of interest for non-profiled deep-learning side-channel attacks using the ANSSI database with a masking countermeasure. The results of investigations indicate that it is better to use a simple network model, apply regularization to prevent over-fitting, and select a wide range of power traces that contain side-channel information as the points of interest. We also implemented AES-128 software implementation protected with the Rotating Sboxes Masking countermeasure, which has never been attacked by non-profiled deep-learning side-channel attacks, on the Xmega128 microcontroller and carried out non-profiled deep-learning side-channel attacks against it. Non-profiled deep-learning side-channel attacks successfully recovered all partial keys while the conventional power analysis could not. The attack results also showed that the least significant bit is the adequate selection for successful non-profiled deep-learning side-channel attacks, but the best labeling method may vary depending on the implementation of the countermeasure algorithm. We conducted two experimental analyses to clarify that deep-learning side-channel attacks learn mask values used in the masking countermeasure. One is the gradient visualization used in previous studies, and the other is a new analysis method using partial removal of power traces.<\/jats:p>","DOI":"10.1007\/s13389-023-00312-6","type":"journal-article","created":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T11:03:23Z","timestamp":1679915003000},"page":"427-442","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Practical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM"],"prefix":"10.1007","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7140-2283","authenticated-orcid":false,"given":"Kunihiro","family":"Kuroda","sequence":"first","affiliation":[]},{"given":"Yuta","family":"Fukuda","sequence":"additional","affiliation":[]},{"given":"Kota","family":"Yoshida","sequence":"additional","affiliation":[]},{"given":"Takeshi","family":"Fujino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,27]]},"reference":[{"key":"312_CR1","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.), Advances in Cryptology\u2014CRYPTO\u2019 99, pp. 388\u2013397. Springer, Heidelberg (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"312_CR2","doi-asserted-by":"crossref","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.), Cryptographic Hardware and Embedded Systems\u2014CHES 2004, pp. 16\u201329. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"312_CR3","doi-asserted-by":"crossref","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: International Workshop on Cryptographic Hardware and Embedded Systems. Springer, pp. 13\u201328 (2002)","DOI":"10.1007\/3-540-36400-5_3"},{"key":"312_CR4","unstructured":"Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. Cryptology ePrint Archive, Report 2016\/921 (2016). https:\/\/ia.cr\/2016\/921"},{"key":"312_CR5","unstructured":"Timon, B.: Non-profiled deep learning-based side-channel attacks. Cryptology ePrint Archive, Report 2018\/196 (2018). https:\/\/ia.cr\/2018\/196"},{"key":"312_CR6","doi-asserted-by":"crossref","unstructured":"Cagli, E., Dumas, C., Prouff, E.: Convolutional neural networks with data augmentation against jitter-based countermeasures. In: Fischer, W., Homma, N. (eds.), Cryptographic Hardware and Embedded Systems\u2014CHES 2017. Springer, Cham, pp. 45\u201368 (2017)","DOI":"10.1007\/978-3-319-66787-4_3"},{"key":"312_CR7","doi-asserted-by":"crossref","unstructured":"Hou, S., Zhou, Y., Liu, H., Zhu, N.: Improved DPA attack on rotating s-boxes masking scheme. In: 2017 IEEE 9th International Conference on Communication Software and Networks (ICCSN), pp. 1111\u20131116 (2017)","DOI":"10.1109\/ICCSN.2017.8230283"},{"key":"312_CR8","doi-asserted-by":"crossref","unstructured":"Gilmore, R., Hanley, N., O\u2019Neill, M.: Neural network based attack on a masked implementation of AES. In: 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 106\u2013111 (2015)","DOI":"10.1109\/HST.2015.7140247"},{"key":"312_CR9","unstructured":"Emmanuel, P., Remi, S., Ryad, B., Eleonora, C., Cecile, D.: Study of deep learning techniques for side-channel analysis and introduction to ascad database. Cryptology ePrint Archive, Report 2018\/053 (2018). https:\/\/ia.cr\/2018\/053"},{"issue":"2","key":"312_CR10","doi-asserted-by":"publisher","first-page":"107","DOI":"10.46586\/tches.v2019.i2.107-131","volume":"2019","author":"B Timon","year":"2019","unstructured":"Timon, B.: Non-profiled deep learning-based side-channel attacks with sensitivity analysis. IACR Trans. Cryptogr. Hardw. Embedded Syst. 2019(2), 107\u2013131 (2019)","journal-title":"IACR Trans. Cryptogr. Hardw. Embedded Syst."},{"key":"312_CR11","doi-asserted-by":"publisher","first-page":"22480","DOI":"10.1109\/ACCESS.2021.3055833","volume":"9","author":"Y-S Won","year":"2021","unstructured":"Won, Y.-S., Han, D.-G., Jap, D., Bhasin, S., Park, J.-Y.: Non-profiled side-channel attack based on deep learning using picture trace. IEEE Access 9, 22480\u201322492 (2021)","journal-title":"IEEE Access"},{"key":"312_CR12","doi-asserted-by":"crossref","unstructured":"Alipour, A., Papadimitriou, A., Beroulle, V., Aerabi, E., Hely, D.: On the performance of non-profiled differential deep learning attacks against an AES encryption algorithm protected using a correlated noise generation based hiding countermeasure. In: 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), Grenoble, France. IEEE, pp. 614\u2013617 (2020)","DOI":"10.23919\/DATE48585.2020.9116387"},{"key":"312_CR13","unstructured":"NewAE.: Cw1173 chipwhisperer-lite. https:\/\/rtfm.newae.com\/Capture\/ChipWhisperer-Lite (2021)"},{"key":"312_CR14","unstructured":"Masure, L., Dumas, C., Prouff, E.: Gradient visualization for general characterization in profiling attacks. Cryptology ePrint Archive, Report 2018\/1196 (2018). https:\/\/ia.cr\/2018\/1196"},{"key":"312_CR15","unstructured":"Lundberg, S.M., Lee, S.-I.: A unified approach to interpreting model predictions. arXiv:1705.07874 (2017)"},{"key":"312_CR16","unstructured":"DPAContestV4. Dpacontestv4. http:\/\/www.dpacontest.org\/v4\/42_doc.php (2021)"},{"key":"312_CR17","doi-asserted-by":"crossref","unstructured":"Akkar, M.-L., Giraud, C.: An implementation of DES and AES, secure against some attacks. In: Cryptographic Hardware and Embedded Systems\u2014CHES 2001, Third International Workshop, Paris, France, May 14\u201316, 2001, Proceedings, volume 2162 of Lecture Notes in Computer Science. Springer, pp. 309\u2013318 (2001)","DOI":"10.1007\/3-540-44709-1_26"},{"key":"312_CR18","doi-asserted-by":"crossref","unstructured":"Prouff, E., Rivain, M.: A generic method for secure sbox implementation. In: Proceedings of the 8th International Conference on Information Security Applications, WISA\u201907. Springer, Berlin, pp. 227\u2013244 (2007)","DOI":"10.1007\/978-3-540-77535-5_17"},{"key":"312_CR19","doi-asserted-by":"crossref","unstructured":"Nassar, M., Souissi, Y., Guilley, S., Danger, J.-L.: RSM: a small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs. In: Design Automation and Test in Europe, Desden, Germany, pp. 1173\u20131178 (2012) 6 pages","DOI":"10.1109\/DATE.2012.6176671"},{"issue":"6","key":"312_CR20","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.1109\/TCAD.2020.3033495","volume":"40","author":"L Zhang","year":"2021","unstructured":"Zhang, L., Xing, X., Fan, J., Wang, Z., Wang, S.: Multilabel deep learning-based side-channel attack. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6), 1207\u20131216 (2021)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-023-00312-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13389-023-00312-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-023-00312-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T12:19:25Z","timestamp":1700741965000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13389-023-00312-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,27]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["312"],"URL":"https:\/\/doi.org\/10.1007\/s13389-023-00312-6","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"value":"2190-8508","type":"print"},{"value":"2190-8516","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,27]]},"assertion":[{"value":"11 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}