Open Access Library Journal

Volume 9, Issue 1 (January 2022)

ISSN Print: 2333-9705   ISSN Online: 2333-9721

Google-based Impact Factor: 1.18  Citations  

Software Implementation of AES-128: Cross-Subkey Side Channel Attack

HTML  XML Download Download as PDF (Size: 2999KB)  PP. 1-15  
DOI: 10.4236/oalib.1108307    117 Downloads   1,032 Views  Citations

ABSTRACT

The majority of recently demonstrated Deep-Learning Side-Channel Attacks (DLSCAs) use neural networks trained on a segment of traces containing operations only related to the target subkey. However, when the number of training traces is restricted such as in the ASCAD database, deep-learning models always suffer from overfitting since the insufficient training data. One data-level solution is called data augmentation, which is to use the additional synthetically modified traces to act as a regularizer to provide a better generalization capacity for deep-learning models. In this paper, we propose a cross-subkey training approach which acts as a trace augmentation. We train deep-learning models not only on a segment of traces containing the SBox operation of the target subkey of AES-128, but also on segments for other 15 subkeys. We show that training a network model by combining different subkeys outperforms a traditional network model trained with a single subkey, and prove the conclusion on two well-known datasets.

Share and Cite:

Hu, F.L., Wang, J.N., Wang, W. and Ni, F. (2022) Software Implementation of AES-128: Cross-Subkey Side Channel Attack. Open Access Library Journal, 9, 1-15. doi: 10.4236/oalib.1108307.

Copyright © 2025 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.