Stoettinger, Marc ; Huss, Sorin ; Mühlbach, Sascha ; Koch, Andreas (2010)
Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography Scheme.
Conference or Workshop Item, Bibliographie
Abstract
Side-channel attacks have changed the design of secure cryptographic systems dramatically. Several published attacks on implementations of well known algorithms such as, e.g., AES, show the need to consider these aspects to build more resistant cryptographic systems. On the other hand, with the increasing use of cryptography in embedded systems a significant demand exists for cryptographic algorithms that are both resource- and power-efficient. These can be either modified existing or completely new ones. One of the candidates for such a new algorithm is the Tree Parity Machine Public Key Exchange, an algorithm based on artificial neural networks. While it has been evaluated in a number of practical applications in the past, its side-channel resistance has not been examined yet. We would like to close this gap and present a side-channel attack strategy as well as results gathered from measurements made on a real implementation.
Item Type: | Conference or Workshop Item |
---|---|
Erschienen: | 2010 |
Creators: | Stoettinger, Marc ; Huss, Sorin ; Mühlbach, Sascha ; Koch, Andreas |
Type of entry: | Bibliographie |
Title: | Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography Scheme |
Language: | English |
Date: | December 2010 |
Book Title: | 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2010) |
Abstract: | Side-channel attacks have changed the design of secure cryptographic systems dramatically. Several published attacks on implementations of well known algorithms such as, e.g., AES, show the need to consider these aspects to build more resistant cryptographic systems. On the other hand, with the increasing use of cryptography in embedded systems a significant demand exists for cryptographic algorithms that are both resource- and power-efficient. These can be either modified existing or completely new ones. One of the candidates for such a new algorithm is the Tree Parity Machine Public Key Exchange, an algorithm based on artificial neural networks. While it has been evaluated in a number of practical applications in the past, its side-channel resistance has not been examined yet. We would like to close this gap and present a side-channel attack strategy as well as results gathered from measurements made on a real implementation. |
Uncontrolled Keywords: | Secure Things |
Divisions: | LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt 20 Department of Computer Science > Integrated Circuits and Systems 20 Department of Computer Science > Embedded Systems and Applications LOEWE > LOEWE-Zentren 20 Department of Computer Science LOEWE |
Date Deposited: | 31 Dec 2016 00:15 |
Last Modified: | 17 May 2018 13:02 |
PPN: | |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
Send an inquiry |
Options (only for editors)
Show editorial Details |