Unsupervised side-channel power analysis based on invariant information clustering

Ning Yang , Long-De Yan , Bi-Yang Liu , Xiang Li , Ai-Dong Chen , Lu Zeng , Wei-Feng Liu

Journal of Electronic Science and Technology ›› 2025, Vol. 23 ›› Issue (4) : 100333

PDF (6368KB)
Journal of Electronic Science and Technology ›› 2025, Vol. 23 ›› Issue (4) : 100333 DOI: 10.1016/j.jnlest.2025.100333
research-article

Unsupervised side-channel power analysis based on invariant information clustering

Author information +
History +
PDF (6368KB)

Abstract

Side-channel analysis (SCA) has emerged as a research hotspot in the field of cryptanalysis. Among various approaches, unsupervised deep learning-based methods demonstrate powerful information extraction capabilities without requiring labeled data. However, existing unsupervised methods, particularly those represented by differential deep learning analysis (DDLA) and its improved variants, while overcoming the dependency on labeled data inherent in template analysis, still suffer from high time complexity and training costs when handling key byte difference comparisons. To address this issue, this paper introduces invariant information clustering (IIC) into SCA for the first time, and thus proposes a novel unsupervised learning-based SCA method, named IIC-SCA. By leveraging mutual information maximization techniques for automatic feature extraction of power leakage data, our approach achieves key recovery through a single training session, eliminating the prohibitive computational overhead of traditional methods that require separate training for all possible key bytes. Experimental results on the ASCAD dataset demonstrate successful key extraction using only 50000 training traces and 2000 attack traces. Furthermore, compared with DDLA, the proposed method reduces training time by approximately 93.40​% and memory consumption by about 6.15%, significantly decreasing the temporal and resource costs of unsupervised SCA. This breakthrough provides new insights for developing low-cost, high-efficiency cryptographic attack methodologies.

Keywords

Deep clustering / Mutual information maximization / Non-profiled analysis / Side-channel analysis / Unsupervised learning

Cite this article

Download citation ▾
Ning Yang, Long-De Yan, Bi-Yang Liu, Xiang Li, Ai-Dong Chen, Lu Zeng, Wei-Feng Liu. Unsupervised side-channel power analysis based on invariant information clustering. Journal of Electronic Science and Technology, 2025, 23(4): 100333 DOI:10.1016/j.jnlest.2025.100333

登录浏览全文

4963

注册一个新账户 忘记密码

CRediT authorship contribution statement

Ning Yang: Conceptualization, Methodology, Writing–original draft, Formal analysis. Long-De Yan: Software, Validation, Investigation, Visualization. Bi-Yang Liu: Formal analysis, Software, Writing–review & editing. Xiang Li: Methodology, Validation, Writing–review & editing. Ai-Dong Chen: Supervision. Lu Zeng: Investigation, Visualization, Validation. Wei-Feng Liu: Data curation, Formal analysis, Writing–review & editing.

Declaration of competing interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

References

[1]

B.S. Go, D.V. Le, M.G. Song, M. Park, I.K. Yu, Design and electromagnetic analysis of an induction-type coilgun system with a pulse power module, IEEE T. Plasma Sci. 47 (1) (2019) 971-976.

[2]

D. Genkin, A. Shamir, E. Tromer, RSA key extraction via low-bandwidth acoustic cryptanalysis, in: Proc. of the 34th Annual Cryptology Conf. on Advances in Cryptology, Santa Barbara, USA, (2014), pp. 444-461.

[3]

T. Perianin, S. Carré, V. Dyseryn, A. Facon, S. Guilley, End-to-end automated cache-timing attack driven by machine learning, J. Cryptogr. Eng. 11 (2) (2021) 135-146.

[4]

A.C. Aldaya, C.P. García, M.A. Tapia, B.B. Brumley, Cache-timing attacks on RSA key generation, IACR T. Cryptograph. Hardware Embedded Syst. 2019 (4) (2019) 213-242.

[5]

R. Benadjila, E. Prouff, R. Strullu, E. Cagli, C. Dumas, Deep learning for side-channel analysis and introduction to ASCAD database, J. Cryptogr. Eng. 10 (2) (2020) 163-188.

[6]

X.-J. Lu, C. Zhang, P. Cao, D.-W. Gu, H.-N. Lu, Pay attention to raw traces: a deep learning architecture for end-to-end profiling attacks, IACR T. Cryptograph. Hardware Embedded Syst. 2021 (3) (2021) 235-274.

[7]

T. Yap, A. Benamira, S. Bhasin, T. Peyrin, Peek into the black-box: interpretable neural network using SAT equations in side-channel analysis, IACR T. Cryptograph. Hardware Embedded Syst. 2023 (2) (2023) 24-53.

[8]

S. Hajra, S. Chowdhury, D. Mukhopadhyay, EstraNet: an efficient shift-invariant transformer network for side-channel analysis, IACR T. Cryptograph. Hardware Embedded Syst. 2024 (1) (2024) 336-374.

[9]

G. Zaid, L. Bossuet, F. Dassance, A. Habrard, A. Venelli, Ranking loss: maximizing the success rate in deep learning side-channel analysis, IACR T. Cryptograph. Hardware Embedded Syst. 2021 (1) (2020) 25-55.

[10]

M. Kerkhof, L.-C. Wu, G. Perin, S. Picek, Focus is key to success: a focal loss function for deep learning-based side-channel analysis, in: Proc. of the 13th Intl. Workshop on Constructive Side-Channel Analysis and Secure Design, Leuven, Belgium, (2022), pp. 29-48.

[11]

A. Rădulescu, P.G. Popescu, M.O. Choudary, GE vs GM: efficient side-channel security evaluations on full cryptographic keys, IACR T. Cryptograph. Hardware Embedded Syst. 2022 (4) (2022) 886-905.

[12]

S. Picek, A. Heuser, A. Jovic, S. Bhasin, R. Regazzoni, The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations, IACR T. Cryptograph. Hardware Embedded Syst. 2019 (1) (2018) 209-237.

[13]

G. Perin, L.-C. Wu, S. Picek, Exploring feature selection scenarios for deep learning-based side-channel analysis, IACR T. Cryptograph. Hardware Embedded Syst. 2022 (4) (2022) 828-861.

[14]

J. Rijsdijk, L.-C. Wu, G. Perin, S. Picek, Reinforcement learning for hyperparameter tuning in deep learning-based side-channel analysis, IACR T. Cryptograph. Hardware Embedded Syst. 2021 (3) (2021) 677-707.

[15]

G. Perin, Ł. Chmielewski, L. Batina, S. Picek, Keep it unsupervised: horizontal attacks meet deep learning, IACR T. Cryptograph. Hardware Embedded Syst. 2021 (1) (2020) 343-372.

[16]

R.Y. Acharya, F. Ganji, D. Forte, Information theory-based evolution of neural networks for side-channel analysis, IACR T. Cryptograph. Hardware Embedded Syst. 2023 (1) (2022) 401-437.

[17]

B. Timon, Non-profiled deep learning-based side-channel attacks with sensitivity analysis, IACR T. Cryptograph. Hardware Embedded Syst. 2019 (2) (2019) 107-131.

[18]

N.T. Do, V.P. Hoang, V.S. Doan, Performance analysis of non-profiled side channel attacks based on convolutional neural networks, in: Proc. of the IEEE Asia Pacific Conf. on Circuits and Systems, Ha Long, Vietnam, (2020), pp. 66-69.

[19]

D. Kwon, H. Kim, S. Hong, Non-profiled deep learning-based side-channel preprocessing with autoencoders, IEEE Access 9 (2021) 57692-57703.

[20]

Y.S. Won, D.G. Han, D. Jap, S. Bhasin, J.Y. Park, Non-profiled side-channel attack based on deep learning using picture trace, IEEE Access 9 (2021) 22480-22492.

[21]

X.-J. Lu, C. Zhang, D.-W. Gu, Attention-based non-profiled side-channel attack, in: Proc. of Asian Hardware Oriented Security and Trust Symposium, Shanghai, China, (2021), pp. 1-6.

[22]

D. Kwon, S. Hong, H. Kim, Optimizing implementations of non-profiled deep learning-based side-channel attacks, IEEE Access 10 (2022) 5957-5967.

[23]

N.T. Do, V.P. Hoang, V.S. Doan, A novel non-profiled side channel attack based on multi-output regression neural network, J. Cryptogr. Eng. 14 (3) (2024) 427-439.

[24]

X. Ji, A. Vedaldi, J. Henriques, Invariant information clustering for unsupervised image classification and segmentation, in: Proc. of the IEEE/CVF Intl. Conf. on Computer Vision, Seoul, Republic of Korea, (2019), pp. 9864-9873.

AI Summary AI Mindmap
PDF (6368KB)

91

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/