Paper 2020/1096

Far Field EM Side-Channel Attack on AES Using Deep Learning

Ruize Wang, Huanyu Wang, and Elena Dubrova

Abstract

We present the first deep learning-based side-channel attack on AES-128 using far field electromagnetic emissions as a side channel. Our neural networks are trained on traces captured from five different Bluetooth devices at five different distances to target and tested on four other Bluetooth devices. We can recover the key from less than 10K traces captured in an office environment at 15 m distance to target even if the measurement for each encryption is taken only once. Previous template attacks required multiple repetitions of the same encryption. For the case of 1K repetitions, we need less than 400 traces on average at 15 m distance to target. This improves the template attack presented at CHES'2020 which requires 5K traces and key enumeration up to $2^{23}$.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Minor revision. 4th ACM Workshop on Attacks and Solutions in Hardware Security (ASHES’2020), November 13, 2020
DOI
10.1145/3411504.3421214
Keywords
Side-channel analysisEM analysisfar field EM emissionsprofiled attackdeep learningAES
Contact author(s)
dubrova @ kth se
History
2020-09-15: received
Short URL
https://ia.cr/2020/1096
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2020/1096,
      author = {Ruize Wang and Huanyu Wang and Elena Dubrova},
      title = {Far Field EM Side-Channel Attack on AES Using Deep Learning},
      howpublished = {Cryptology ePrint Archive, Paper 2020/1096},
      year = {2020},
      doi = {10.1145/3411504.3421214},
      note = {\url{https://eprint.iacr.org/2020/1096}},
      url = {https://eprint.iacr.org/2020/1096}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.