TU Darmstadt / ULB / TUbiblio

Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography Scheme

Stoettinger, Marc ; Huss, Sorin ; Mühlbach, Sascha ; Koch, Andreas (2010)
Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography Scheme.
Konferenzveröffentlichung, Bibliographie

Kurzbeschreibung (Abstract)

Side-channel attacks have changed the design of secure cryptographic systems dramatically. Several published attacks on implementations of well known algorithms such as, e.g., AES, show the need to consider these aspects to build more resistant cryptographic systems. On the other hand, with the increasing use of cryptography in embedded systems a significant demand exists for cryptographic algorithms that are both resource- and power-efficient. These can be either modified existing or completely new ones. One of the candidates for such a new algorithm is the Tree Parity Machine Public Key Exchange, an algorithm based on artificial neural networks. While it has been evaluated in a number of practical applications in the past, its side-channel resistance has not been examined yet. We would like to close this gap and present a side-channel attack strategy as well as results gathered from measurements made on a real implementation.

Typ des Eintrags: Konferenzveröffentlichung
Erschienen: 2010
Autor(en): Stoettinger, Marc ; Huss, Sorin ; Mühlbach, Sascha ; Koch, Andreas
Art des Eintrags: Bibliographie
Titel: Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography Scheme
Sprache: Englisch
Publikationsjahr: Dezember 2010
Buchtitel: 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2010)
Kurzbeschreibung (Abstract):

Side-channel attacks have changed the design of secure cryptographic systems dramatically. Several published attacks on implementations of well known algorithms such as, e.g., AES, show the need to consider these aspects to build more resistant cryptographic systems. On the other hand, with the increasing use of cryptography in embedded systems a significant demand exists for cryptographic algorithms that are both resource- and power-efficient. These can be either modified existing or completely new ones. One of the candidates for such a new algorithm is the Tree Parity Machine Public Key Exchange, an algorithm based on artificial neural networks. While it has been evaluated in a number of practical applications in the past, its side-channel resistance has not been examined yet. We would like to close this gap and present a side-channel attack strategy as well as results gathered from measurements made on a real implementation.

Freie Schlagworte: Secure Things
Fachbereich(e)/-gebiet(e): LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
20 Fachbereich Informatik > Integrierte Schaltungen und Systeme
20 Fachbereich Informatik > Eingebettete Systeme und ihre Anwendungen
LOEWE > LOEWE-Zentren
20 Fachbereich Informatik
LOEWE
Hinterlegungsdatum: 31 Dez 2016 00:15
Letzte Änderung: 17 Mai 2018 13:02
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen