TU Darmstadt / ULB / TUbiblio

Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography Scheme

Stoettinger, Marc ; Huss, Sorin ; Mühlbach, Sascha ; Koch, Andreas (2010)
Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography Scheme.
Conference or Workshop Item, Bibliographie

Abstract

Side-channel attacks have changed the design of secure cryptographic systems dramatically. Several published attacks on implementations of well known algorithms such as, e.g., AES, show the need to consider these aspects to build more resistant cryptographic systems. On the other hand, with the increasing use of cryptography in embedded systems a significant demand exists for cryptographic algorithms that are both resource- and power-efficient. These can be either modified existing or completely new ones. One of the candidates for such a new algorithm is the Tree Parity Machine Public Key Exchange, an algorithm based on artificial neural networks. While it has been evaluated in a number of practical applications in the past, its side-channel resistance has not been examined yet. We would like to close this gap and present a side-channel attack strategy as well as results gathered from measurements made on a real implementation.

Item Type: Conference or Workshop Item
Erschienen: 2010
Creators: Stoettinger, Marc ; Huss, Sorin ; Mühlbach, Sascha ; Koch, Andreas
Type of entry: Bibliographie
Title: Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography Scheme
Language: English
Date: December 2010
Book Title: 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2010)
Abstract:

Side-channel attacks have changed the design of secure cryptographic systems dramatically. Several published attacks on implementations of well known algorithms such as, e.g., AES, show the need to consider these aspects to build more resistant cryptographic systems. On the other hand, with the increasing use of cryptography in embedded systems a significant demand exists for cryptographic algorithms that are both resource- and power-efficient. These can be either modified existing or completely new ones. One of the candidates for such a new algorithm is the Tree Parity Machine Public Key Exchange, an algorithm based on artificial neural networks. While it has been evaluated in a number of practical applications in the past, its side-channel resistance has not been examined yet. We would like to close this gap and present a side-channel attack strategy as well as results gathered from measurements made on a real implementation.

Uncontrolled Keywords: Secure Things
Divisions: LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
20 Department of Computer Science > Integrated Circuits and Systems
20 Department of Computer Science > Embedded Systems and Applications
LOEWE > LOEWE-Zentren
20 Department of Computer Science
LOEWE
Date Deposited: 31 Dec 2016 00:15
Last Modified: 17 May 2018 13:02
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Send an inquiry Send an inquiry

Options (only for editors)
Show editorial Details Show editorial Details