TU Darmstadt / ULB / TUbiblio

Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography Scheme

Stoettinger, Marc and Huss, Sorin and Mühlbach, Sascha and Koch, Andreas (2010):
Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography Scheme.
In: 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2010), [Conference or Workshop Item]

Abstract

Side-channel attacks have changed the design of secure cryptographic systems dramatically. Several published attacks on implementations of well known algorithms such as, e.g., AES, show the need to consider these aspects to build more resistant cryptographic systems. On the other hand, with the increasing use of cryptography in embedded systems a significant demand exists for cryptographic algorithms that are both resource- and power-efficient. These can be either modified existing or completely new ones. One of the candidates for such a new algorithm is the Tree Parity Machine Public Key Exchange, an algorithm based on artificial neural networks. While it has been evaluated in a number of practical applications in the past, its side-channel resistance has not been examined yet. We would like to close this gap and present a side-channel attack strategy as well as results gathered from measurements made on a real implementation.

Item Type: Conference or Workshop Item
Erschienen: 2010
Creators: Stoettinger, Marc and Huss, Sorin and Mühlbach, Sascha and Koch, Andreas
Title: Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography Scheme
Language: ["languages_typename_1" not defined]
Abstract:

Side-channel attacks have changed the design of secure cryptographic systems dramatically. Several published attacks on implementations of well known algorithms such as, e.g., AES, show the need to consider these aspects to build more resistant cryptographic systems. On the other hand, with the increasing use of cryptography in embedded systems a significant demand exists for cryptographic algorithms that are both resource- and power-efficient. These can be either modified existing or completely new ones. One of the candidates for such a new algorithm is the Tree Parity Machine Public Key Exchange, an algorithm based on artificial neural networks. While it has been evaluated in a number of practical applications in the past, its side-channel resistance has not been examined yet. We would like to close this gap and present a side-channel attack strategy as well as results gathered from measurements made on a real implementation.

Title of Book: 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2010)
Uncontrolled Keywords: Secure Things
Divisions: LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
20 Department of Computer Science > Integrated Circuits and Systems
20 Department of Computer Science > Embedded Systems and Applications
LOEWE > LOEWE-Zentren
20 Department of Computer Science
LOEWE
Date Deposited: 31 Dec 2016 00:15
Identification Number: ISS:Stoettinger:2010:SideChannelR:192
Export:

Optionen (nur für Redakteure)

View Item View Item