Abstract

Profiled attacks employing machine learning techniques for secret information extraction are currently one of the main interests of the research community working on side channel attacks. In this work, we tackle the use of machine learning methods to perform a power consumption based side channel attack against asymmetric cryptosystems. In particular, we analyze different machine-learning based strategies to retrieve the secret exponent from a square-and-multiply-always modular exponentiation in RSA cryptosystem software implementations. We validate our proposals conducting effective attacks against the modular exponentiation contained in the BearSSL software library, a timing side-channel hardened public library. The experimental validation shows that our attack strategy improves the state-of-art solution and is able to retrieve the correct exponent value with a single trace from the attacked device, and, in the worst case, with an exhaustive search in a set of candidates containing a few hundred possible values for the sought secret.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call