• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于迁移学习的 SPECK 侧信道分析。

Side Channel Analysis of SPECK Based on Transfer Learning.

机构信息

School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China.

出版信息

Sensors (Basel). 2022 Jun 21;22(13):4671. doi: 10.3390/s22134671.

DOI:10.3390/s22134671
PMID:35808166
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9268767/
Abstract

Although side-channel attacks based on deep learning are widely used in AES encryption algorithms, there is little research on lightweight algorithms. Lightweight algorithms have fewer nonlinear operations, so it is more difficult to attack successfully. Taking SPECK, a typical lightweight encryption algorithm, as an example, directly selecting the initial key as the label can only crack the first 16-bit key. In this regard, we evaluate the leakage of SPECK's operations (modular addition, XOR, shift), and finally select the result of XOR operation as the label, and successfully recover the last 48-bit key. Usually, the divide and conquer method often used in side-channel attacks not only needs to train multiple models, but also the different bytes of the key are regarded as unrelated individuals. Through the visualization method, we found that different key bytes overlap in the position of the complete electromagnetic leakage signal. That is, when SPECK generates a round key, there is a connection between different bytes of the key. In this regard, we propose a transfer learning method for different byte keys. This method can take advantage of the similarity of key bytes, improve the performance starting-point of the model, and reduce the convergence time of the model by 50%.

摘要

虽然基于深度学习的侧信道攻击被广泛应用于 AES 加密算法中,但针对轻量级算法的研究却很少。轻量级算法的非线性运算较少,因此成功攻击的难度更大。以典型的轻量级加密算法 SPECK 为例,直接选择初始密钥作为标签,只能破解前 16 位密钥。针对这一问题,我们评估了 SPECK 操作(模加、异或、移位)的泄漏情况,最终选择异或操作的结果作为标签,并成功恢复了最后 48 位密钥。通常,侧信道攻击中常用的分治方法不仅需要训练多个模型,而且还将密钥的不同字节视为互不相关的个体。通过可视化方法,我们发现不同的密钥字节在完整电磁泄漏信号的位置上存在重叠。也就是说,当 SPECK 生成轮密钥时,密钥的不同字节之间存在关联。有鉴于此,我们提出了一种针对不同字节密钥的迁移学习方法。该方法可以利用密钥字节的相似性,提高模型的起点性能,并将模型的收敛时间缩短 50%。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/40a8/9268767/b76d5b7a4784/sensors-22-04671-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/40a8/9268767/aef3210dc5f8/sensors-22-04671-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/40a8/9268767/4669047d4d47/sensors-22-04671-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/40a8/9268767/5a155407e7bc/sensors-22-04671-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/40a8/9268767/e87e644ff279/sensors-22-04671-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/40a8/9268767/93a834232104/sensors-22-04671-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/40a8/9268767/a95e5f0a0902/sensors-22-04671-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/40a8/9268767/2018ed6b9c6d/sensors-22-04671-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/40a8/9268767/4e0c66db3631/sensors-22-04671-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/40a8/9268767/b76d5b7a4784/sensors-22-04671-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/40a8/9268767/aef3210dc5f8/sensors-22-04671-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/40a8/9268767/4669047d4d47/sensors-22-04671-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/40a8/9268767/5a155407e7bc/sensors-22-04671-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/40a8/9268767/e87e644ff279/sensors-22-04671-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/40a8/9268767/93a834232104/sensors-22-04671-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/40a8/9268767/a95e5f0a0902/sensors-22-04671-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/40a8/9268767/2018ed6b9c6d/sensors-22-04671-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/40a8/9268767/4e0c66db3631/sensors-22-04671-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/40a8/9268767/b76d5b7a4784/sensors-22-04671-g009.jpg

相似文献

1
Side Channel Analysis of SPECK Based on Transfer Learning.基于迁移学习的 SPECK 侧信道分析。
Sensors (Basel). 2022 Jun 21;22(13):4671. doi: 10.3390/s22134671.
2
Distributed power analysis attack on SM4 encryption chip.对SM4加密芯片的分布式功耗分析攻击
Sci Rep. 2024 Jan 10;14(1):1007. doi: 10.1038/s41598-023-50220-2.
3
Deep-Learning-Based Cryptanalysis of Lightweight Block Ciphers Revisited.基于深度学习的轻量级分组密码密码分析再探讨
Entropy (Basel). 2023 Jun 28;25(7):986. doi: 10.3390/e25070986.
4
A Novel Multi-Objective Electromagnetic Analysis Based on Genetic Algorithm.基于遗传算法的新型多目标电磁分析。
Sensors (Basel). 2019 Dec 15;19(24):5542. doi: 10.3390/s19245542.
5
A novel AES-DES with improved Cheetah optimisation algorithm for secured medical data transmission in cloud environment.一种基于改进猎豹优化算法的 AES-DES 新型算法,用于云环境中安全的医疗数据传输。
J Med Eng Technol. 2024 Apr;48(3):100-117. doi: 10.1080/03091902.2024.2392550. Epub 2024 Sep 16.
6
Side channel analysis based on feature fusion network.基于特征融合网络的侧信道分析。
PLoS One. 2022 Oct 17;17(10):e0274616. doi: 10.1371/journal.pone.0274616. eCollection 2022.
7
Is Homomorphic Encryption-Based Deep Learning Secure Enough?基于同态加密的深度学习安全吗?
Sensors (Basel). 2021 Nov 24;21(23):7806. doi: 10.3390/s21237806.
8
DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation.DNA 密码术与基于 NW 算法的遗传算法和深度学习的密钥生成。
J Med Syst. 2017 Dec 5;42(1):17. doi: 10.1007/s10916-017-0851-z.
9
A secure multi-party computation protocol without CRS supporting multi-bit encryption.一种无 CRS 支持的多比特加密的安全多方计算协议。
PLoS One. 2022 Mar 18;17(3):e0265572. doi: 10.1371/journal.pone.0265572. eCollection 2022.
10
An Evaluation of Power Side-Channel Resistance for RNS Secure Logic.基于余数数制(RNS)的安全逻辑的功耗侧信道抗性评估
Sensors (Basel). 2022 Mar 14;22(6):2242. doi: 10.3390/s22062242.

引用本文的文献

1
Deep learning-based profiling side-channel attacks in SPECK cipher.基于深度学习的SPECK密码侧信道攻击剖析
Sci Rep. 2025 Jul 18;15(1):26149. doi: 10.1038/s41598-025-08888-1.
2
Improvement of Electromagnetic Side-Channel Information Measurement Platform.电磁侧信道信息测量平台的改进。
Sensors (Basel). 2023 Mar 8;23(6):2917. doi: 10.3390/s23062917.
3
Design and Testing of a Computer Security Layer for the LIN Bus.设计和测试 LIN 总线上的计算机安全层。
Sensors (Basel). 2022 Sep 13;22(18):6901. doi: 10.3390/s22186901.