Paper 2019/860

Machine learning and side channel analysis in a CTF competition

Yongbo Hu, Yeyang Zheng, Pengwei Feng, Lirui Liu, Chen Zhang, Aron Gohr, Sven Jacob, Werner Schindler, Ileana Buhan, and Karim Tobich

Abstract

Machine learning is nowadays supplanting or extending human expertise in many domains ranging from board games to text translation. Correspondingly, the use of such tools is also on the rise in computer security. Alongside CHES 2018, a side channel challenge was organised under the theme of ’Deep Learning vs Classical SCA’ to test whether Deep Learning is presently widely used in the SCA community and whether it yields competitive results. The competition had 58 participants, it ran for three months, and a quantity of 35GB of data was used as a test sample. This paper presents the solutions of the teams that captured a flag and then discusses the results. While deep learning was used by neither team, other machine learning methods turned out to be very useful. The first contribution is a snapshot in time of the expertise in the community and shows a clear bias towards classic SCA. The second contribution is the presentation of novel techniques for key extraction for the challenges proposed and a reference for a black-box evaluation of crypto primitives by experts in the field. The third contribution is a baseline which can be used to further improve upon. Based on the results of this competition, we conclude that human expertise remains very important in the design of successful SCA attacks and machine learning can be a useful tool. Section 2,3 and 4 of this report have been directly contributed by the winning teams; as a consequence, section 3 is essentially identical to the previous eprint https://eprint.iacr.org/2019/094/20190131:230649 [8] authored by A. Gohr, S. Jacob and W. Schindler.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
key recoverydeep learningmachine learningside channel analysisblack-box evaluations
Contact author(s)
ileana buhan @ gmail com
History
2019-07-24: received
Short URL
https://ia.cr/2019/860
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/860,
      author = {Yongbo Hu and Yeyang Zheng and Pengwei Feng and Lirui Liu and Chen Zhang and Aron Gohr and Sven Jacob and Werner Schindler and Ileana Buhan and Karim Tobich},
      title = {Machine learning and side channel analysis in a CTF competition},
      howpublished = {Cryptology ePrint Archive, Paper 2019/860},
      year = {2019},
      note = {\url{https://eprint.iacr.org/2019/860}},
      url = {https://eprint.iacr.org/2019/860}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.