Future Scope

Current Limitations

Although the project demonstrates successful cryptanalysis using simulated data and deep learning models, several limitations remain:

1. Synthetic Side-Channel Traces

The SPECK32 dataset is generated using a simulated Hamming Weight leakage model.
Real hardware traces contain:

  • measurement noise
  • clock jitter
  • voltage fluctuations
  • device-specific leakage behaviour

These factors make real-world attacks significantly more challenging.


2. Fixed-Key Profiling Assumption

The current profiling setup assumes access to a device with a fixed and known key during training.
In practical attack scenarios, the attacker may not have access to such a profiling device, leading to a mismatch between training and attack conditions.


3. Limited Cipher Coverage

The project focuses on:

  • Vigenère (classical)
  • DES (Feistel network)
  • SPECK32 (ARX lightweight cipher)

Modern cryptographic deployments primarily use AES and other standardized block ciphers, which involve more complex leakage behaviour and larger key spaces.


4. CNN Architectural Constraints

Convolutional Neural Networks are effective at capturing local temporal features but have limitations:

  • difficulty modelling long-range dependencies
  • sensitivity to large desynchronization
  • fixed receptive field

This restricts performance on highly misaligned traces.


5. Partial Key Recovery

The DES implementation targets S-box subkey recovery rather than full key reconstruction.
Extending the attack to full key recovery requires combining multiple subkey predictions and performing key schedule inversion.


6. Energy Model Scalability

The energy-based classifier is currently applied to cipher classification and key hypothesis scoring.
Scaling this approach to full key spaces of modern ciphers requires:

  • efficient candidate pruning
  • hierarchical search strategies
  • improved energy function generalization

Proposed Future Work

1. Real Hardware Side-Channel Acquisition

Collect power traces from:

  • microcontrollers
  • FPGA implementations

This will enable evaluation of the models under realistic noise and leakage conditions.


2. AES Side-Channel Analysis

Extend the framework to AES, which introduces:

  • SubBytes nonlinear leakage
  • MixColumns diffusion
  • larger key size

This will test the scalability of CNN and energy-based models.


3. Transformer-Based Leakage Modelling

Replace CNNs with Transformer architectures to:

  • capture long-range temporal dependencies
  • handle large desynchronization
  • improve feature learning across entire traces

4. Countermeasure Evaluation

Implement and analyse common hardware countermeasures:

  • masking
  • hiding
  • shuffling

Study how deep learning models can adapt to protected implementations.


5. Full Key Recovery Pipeline

Combine:

  • multiple subkey predictions
  • key schedule inversion
  • probabilistic key search

to achieve complete key reconstruction for DES and AES.


Use the energy model for:

  • hierarchical key candidate pruning
  • beam search over key space
  • reinforcement learning guided cryptanalysis

This will enable efficient exploration of large key spaces.


7. Transfer Learning for Side-Channel Attacks

Train models on one device and adapt them to another using:

  • domain adaptation
  • fine-tuning
  • few-shot learning

This addresses the profiling mismatch problem.


Research Impact

Future work will move the project from simulated cryptanalysis to practical, real-world attack scenarios and improve the scalability of machine learning based side-channel analysis.