2023
DOI: 10.5755/j02.eie.34650
|View full text |Cite
|
Sign up to set email alerts
|

Deep Learning Method for Power Side-Channel Analysis on Chip Leakages

Amjed Abbas Ahmed,
Rana Ali Salim,
Mohammad Kamrul Hasan

Abstract: Power side channel analysis signal analysis is automated using deep learning. Signal processing and cryptanalytic techniques are necessary components of power side channel analysis. Chip leakages can be found using a classification approach called deep learning. In addition to this, we do this so that the deep learning network can automatically tackle signal processing difficulties such as re-alignment and noise reduction. We were able to break minimally protected Advanced Encryption Standard (AES), as well as… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…As an example, the amount of time required to carry out a successful attack as well as the amount of effort required to carry out the assault, often known as the degree of difficulty, are evaluated as part of the Common Criteria security evaluation of a device. According to [9], the total security grade of the chip is impacted by both of these criteria. In a nutshell, trust in security evaluation entails taking into consideration the most dangerous adversary, which has an effect on the attack tactics that are chosen [10].…”
Section: Introductionmentioning
confidence: 99%
“…As an example, the amount of time required to carry out a successful attack as well as the amount of effort required to carry out the assault, often known as the degree of difficulty, are evaluated as part of the Common Criteria security evaluation of a device. According to [9], the total security grade of the chip is impacted by both of these criteria. In a nutshell, trust in security evaluation entails taking into consideration the most dangerous adversary, which has an effect on the attack tactics that are chosen [10].…”
Section: Introductionmentioning
confidence: 99%