Paper 2026/301

Blind Leakage: Rethinking Deep Learning-based Non-Profiled Side-Channel Analysis

Jintong Yu, Shanghai Jiao Tong University
Abstract

Deep Learning-based Non-profiled Side-Channel Analysis (DL-NSCA) enables automated feature extraction and obviates the need for a profiling device. However, existing methods mostly rely on leakage from non-linear operations and require prior knowledge of the target algorithm and its plaintexts/ciphertexts, which restricts their applicability to black-box scenarios and proprietary implementations. Motivated by the ubiquity of plaintext-key XOR operations in cryptographic algorithms, this paper presents a new SCA perspective based on leakage from linear operations to enable cross-algorithm attacks. We first theoretically demonstrate that leakage from invertible linear operations, referred to as blind leakage, introduces two symmetric maxima of the correlations between key guesses and leakage (one for non-blind leakage), rendering existing distinguishers ineffective. To address this issue, we then propose a distinguisher, VS-GBA, applicable to both blind and non-blind leakage, and improve its robustness using a Gaussian Borda voting scheme. Experimental results on a high-noise ARM Cortex-M4 device demonstrate that our method enables effective cross-algorithm attacks on masked AES, ASCON, and PRESENT, and outperforms non-blind leakage attacks. Furthermore, attacking XTS-AES demonstrates that blind leakage exploitation extends the boundaries of DL-NSCA to scenarios where plaintexts/ciphertexts are XORed with a tweak.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Side-Channel Analysis
Contact author(s)
jintongyu @ sjtu edu cn
History
2026-02-18: approved
2026-02-18: received
See all versions
Short URL
https://ia.cr/2026/301
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2026/301,
      author = {Jintong Yu},
      title = {Blind Leakage: Rethinking Deep Learning-based Non-Profiled Side-Channel Analysis},
      howpublished = {Cryptology {ePrint} Archive, Paper 2026/301},
      year = {2026},
      url = {https://eprint.iacr.org/2026/301}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.