Bypass Analysis Based on Convolutional Neural Networks
DOI:
https://doi.org/10.54097/xrc2pz93Keywords:
Convolutional Neural Networks, Side-Channel Analysis, VGGNet, AlexNet.Abstract
Side-channel analysis, as a key branch of cryptanalysis, poses a serious threat to the security of embedded smart devices. With the development of artificial intelligence technology, side-channel cryptanalysis methods based on convolutional neural networks (CNNSCA) have become a research hotspot. This paper focuses on the modeling and analysis of CNNSCA, exploring its application in side-channel cryptographic attacks. In traditional side-channel analysis techniques, non-modeling methods such as Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) require domain knowledge to construct guess models; modeling methods like Template Attacks (TA) involve template construction and matching phases. CNNSCA leverages the advantages of deep learning to automatically extract data features. Experimental results demonstrate that CNNSCA outperforms traditional TA when attacking ideal low-noise side-channel signals, and shows greater advantage in attacking distorted side-channel signals due to noise and countermeasures, providing new avenues for improving the efficiency of side-channel cryptographic attacks and countering protective strategies, which is of significant importance for ensuring the security of cryptographic systems.
Downloads
References
[1] O'Shea K, Nash R. An introduction to convolutional neural networks. arXiv preprint arXiv: 1511.08458, 2015.
[2] Fangfang. Research on power load forecasting based on improved BP neural network. Harbin Institute of Technology, 2011.
[3] Liu Linyun, Chen Kaiyan, Li Xiongwei, Zhang Yang, Xie Fangfang. Overview of side channel analysis based on convolutional neural network. Computer Science, 2022, 49 (5): 296 - 302.
[4] Kocher P, Jaffe J, Jun B. Differential power analysis. In: Annual International Cryptology Conference, 1999: 388 - 397. Berlin, Heidelberg: Springer Berlin Heidelberg.
[5] Simonyan K, Zisserman A. Very deep convolutional networks for large-scale image recognition. Computer Science, 2014.
[6] Guo Dongxin, Chen Kaiyan, Zhang Yang, et al. new template attack method for encryption chip based on VGGNet convolutional neural network. Application Research of Computers, 2019, 36 (9): 2809 - 2812.
[7] Cao Jiahua, Wu Zhen, Wang Yi, et al. S-Box power randomization side channel attack based on CNN-BPR. Journal of Chengdu University of Information Technology, 2022, 37 (1): 5.
[8] Luo Man, Zhang Hongxin. Research on electromagnetic attacks of AES cryptographic chips based on deep residual neural networks. Journal of Electromagnetic Waves and Applications, 2019, 34 (4): 5.
[9] Xiao Chong, Tang Ming. A review of side channel analysis based on deep learning. Journal of Computer Research and Development, 2025 (3).
[10] Maghrebi H, Portigliatti T, Prouff E. Breaking cryptographic implementations using deep learning techniques. In: Carlet C, Hasan M, Saraswat V, eds. Security, Privacy, and Applied Cryptography Engineering. SPACE 2016. Lecture Notes in Computer Science, vol 10076. Springer, Cham, 2016.
[11] Benadjila R, Prouff E, Strullu R, et al. Deep learning for side-channel analysis and introduction to ASCAD database. Journal of Cryptographic Engineering, 2020, 10: 163 – 188.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Highlights in Science, Engineering and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.







