Side-Channel Attack-Resistant Smart Card Encryption Using Neural Signal Obfuscation
DOI:
https://doi.org/10.30526/39.2.4334Keywords:
Neural Signal Obfuscation (NSO), Side-Channel Attacks, AES-128 Encryption, Machine Learning, Power AnalysisAbstract
Crypto systems deployed in smart cards and embedded devices are vulnerable to side-channel attacks, in which adversaries exploit power consumption to recover secret keys. Correlation power analysis (CPA) and machine-learning-based attacks can break AES-128 implementations with relatively few traces. This work investigates Neural Signal Obfuscation (NSO) as a practical countermeasure for an AES-128 smart card-style implementation. We first acquire and characterize power traces from the target device and quantify baseline leakage using traces-to-disclosure (TTD), guessing entropy (GE), signal-to-noise ratio (SNR), and the success rate of a neural network attacker. We then design and train a lightweight one-dimensional convolutional obfuscator that transforms power traces to suppress exploitable leakage while preserving correct cryptographic functionality. Re-evaluating obfuscated traces under the same CPA and machine-learning attacks shows that NSO increases TTD, reduces GE and SNR, and lowers the attacker's accuracy, forcing an adversary to collect significantly more traces to recover the key than in the unsecured baseline implementation.
References
1. Mangard S, Oswald E, Popp T. Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer. 2007. https://doi.org/10.1007/978-0-387-38162-6
2. Negabi I, Ait El Asri S, El Adib S, Charkaoui A. Beyond encryption: How deep learning can break microcontroller security through power analysis. e-Prime. 2025; 11:100947. https://doi.org/10.1016/j.prime.2025.100947
3. Picek S, Heuser A, Jovic A, Bhasin S, Regazzoni F. The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019;2019(1):209-237. https://doi.org/10.13154/tches.v2019.i1.209-237
4. Negabi I, Ait El Asri S, El Adib S, Charkaoui A. Enhancing cryptosystem security with a convolutional neural network-based countermeasure against power analysis attacks. Arabian J. Sci. Eng. 2025. https://doi.org/10.1007/s13369-025-10485-3
5. Li L, Ou Y. A deep learning-based side channel attack model for different block ciphers. J. Comput. Sci. 2023; 72:102078. https://doi.org/10.1016/j.jocs.2023.102078
6. Staib MDL, Moradi A. Deep learning side-channel collision attack. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023;2023(3):422-444. https://doi.org/10.46586/tches.v2023.i3.422-444
7. Zhou Y, Feng D. Side-channel attacks: Ten years after its publication and the impacts on cryptographic module security testing. Cryptol. ePrint Arch. 2023. https://eprint.iacr.org/2005/388
8. Benadjila R, Prouff E, Strullu R, Cagli E, Dumas C. Deep learning for side-channel analysis and introduction to ASCAD database. J. Cryptogr. Eng. 2020;10(2):163-188. https://doi.org/10.1007/s13389-019-00220-8
9. Chen Y, Wang B, Su CK, Ng JL, Lee YC. AutoProfile: Automated profiling in deep learning-based side-channel analysis. Neural Netw. 2025;186:108009. https://doi.org/10.1016/j.neunet.2025.108009
10. Maghrebi H, Portigliatti T, Prouff E. Breaking cryptographic implementations using deep learning techniques. Security, Privacy, and Applied Cryptography Engineering. 2016;9763:3-26. https://doi.org/10.1007/978-3-319-49445-6_1
11. Picek S, Heuser A, Jovic A, Bhasin S, Regazzoni F. Still Making Noise: Improving Deep-Learning-Based Side-Channel Analysis. IEEE Des. Test. 2025;42(1):45-58. https://doi.org/10.1109/MDAT.2024.3510421
12. Kim J, Picek S, Heuser A, Bhasin S, Hanjalic A. Make some noise. Unleashing the power of convolutional neural networks for profiled side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019;2019(3):148-179. https://doi.org/10.13154/tches.v2019.i3.148-179
13. Zaid G, Bossuet L, Habrard A, Venelli A. Methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst.. 2020;2020(1):1-36. https://doi.org/10.13154/tches.v2020.i1.1-36
14. Ünal S, Başkaya F. An energy-efficient parallel ASIC implementation of advanced encryption standard (AES) algorithm robust against side-channel attacks. Fen-Müh. Derg. 2025;27(79):152-159. https://doi.org/10.21205/deufmd.2025277920
15. Alabdulwahab S, Cheong M, Seo A, Kim H, Yi O. Enhancing deep learning-based side-channel analysis using feature engineering in a fully simulated IoT system. Expert Syst. Appl. 2024; 262:126079. https://doi.org/10.1016/j.eswa.2024.126079
16. Tran TH, Dam DT, Dang TK, Hoang TT, Pham CK. Countering side-channel attacks with a dynamic S-box based on affine transformations and gold sequences. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2025;33(3):849-862. https://doi.org/10.1109/tvlsi.2025.3595897
17. Zhang Y, He PF, Gan H, Jiang XY, Wang Q. Side-channel power analysis based on SA-SVM. Appl. Sci. 2023;13(9):5671. https://doi.org/10.3390/app13095671.
18. Xia S, Li L, Ou Y, Xiang J. Optimizing label correlation in deep learning-based side-channel analysis. Microelectronics J. 2025;159:106721. https://doi.org/10.1016/j.mejo.2025.106721
19. Cassiers G, Masure L, Momin C, Moos T, Moradi A, Standaert FX. Prime-field masking in hardware and its soundness against low-noise SCA attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023;2023(2):482-518. https://doi.org/10.46586/tches.v2023.i2.482-518
20. Tyler JH, Fadul MKM, Reising DR. Transformers--messages in disguise. Mach. Learn. Appl. 2025; 19:100669. https://doi.org/10.1016/j.mlwa.2025.100669
21. Ding AA, Chen L, Fei Y. A statistical model for higher order DPA on masked devices. Cryptogr. Hardw. Embed. Syst. 2014;8731:147-169. https://doi.org/10.1007/978-3-662-44709-3_9
22. Ng JS, Chen J, Kyaw NA, Chong KS, Chang JS, Gwee BH. Securing against side-channel attacks with wide-range in situ random voltage dithering on async-logic AES engine. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2024;32(9):1674-1687. https://doi.org/10.1109/tvlsi.2024.3409650
23. Srivastava A, Tan S, Tehranipoor M, Forte D. SCAR: Power Side-Channel Analysis at RTL Level. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2024;32(6):1110-1123. https://doi.org/10.1109/TVLSI.2024.3390601
24. Heydari V, Nyarko K. Enhancing adversarial robustness in network intrusion detection: a novel adversarially trained neural network approach. Electronics. 2025;14(16):3249. https://doi.org/10.3390/electronics14163249
25. Hajra S, Alam M, Saha S, Mukhopadhyay D, Picek S. On the instability of softmax attention-based deep learning models in side-channel analysis. IEEE Trans. Inf. Forensics Secur. 2024;19:1424-1439 https://doi.org/10.1109/tifs.2023.3326667
26. Ebina K, Ueno R, Homma N. Side-channel analysis against SecOC-compliant AES-CMAC. IEEE Trans. Circuits Syst. II, Exp. Briefs. 2023;70(11):4013-4017. https://doi.org/10.1109/TCSII.2023.3288278
27. Zoni D, Galimberti A, Galli D. An FPGA-Based Open-Source Hardware-Software Framework for Side-Channel Security Research. IEEE Trans. Comput. 2025;74(6):2087-2100. https://doi.org/10.1109/TC.2025.3551936
28. Stypiński M, Niemiec M. Security of neural network-based key agreement protocol for smart grids. Energies. 2023; 16(10): 3997. https://doi.org/10.3390/en16103997
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Ibn AL-Haitham Journal For Pure and Applied Sciences

This work is licensed under a Creative Commons Attribution 4.0 International License.
licenseTerms





