The effectiveness of deep learning techniques has increased in recent years, making it possible to assess side channel attacks on System-on-Chips (SoCs). Specifically, this is due to the fact that they provide a sophisticated method to capitalise on the unintended loss of information that occurs during cryptographic procedures. In this particular scenario, it is very necessary to collect information on side channels, such as power consumption or electromagnetic emissions. There is a procedure called as preprocessing that involves cleaning and modifying the raw data in order to make it more acceptable for input into neural networks. The specifics of the side channel information are what define whether or not a deep learning architecture, such as Recurrent Neural Networks (RNNs), Long Short-Term Memory (LSTM) networks, or other specialist structures, should be used. Following this, the architecture of the model is painstakingly created, consisting of layers, units, and activation functions, with the purpose of effectively collecting and deciphering the intricate patterns that are associated with the processing of sensitive data on the SOC.As part of this study, we presented a CNN-dependent profiled SCA assault that was directed against an AES cypher that was operating on a SoC. During the phase of setup, we focus on the discharge from a minor capacitor that is linked with the principal line of power supply. This capacitor produces a distinct signal, and we do not capture electromagnetic emission of chip surface. When it comes to the matching and profiling phases, CNN is then used. In light of the fact that the most recent AES round did not uncover any leaks, it is recommended that a novel approach be used in order to retrieve the keys from the first round, Through the use of AES algorithm observations, we were able to develop a differential equation that included the selected intermediate value and basic text. This equation in the end resulted in possibility of advantageous for incorrect value.