Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms

被引:0
|
作者
Singh, Purushottam [1 ]
Pranav, Prashant [1 ]
Dutta, Sandip [1 ]
机构
[1] Birla Inst Technol Mesra, Dept Comp Sci & Engn, Ranchi 835215, Jharkhand, India
来源
SCIENTIFIC REPORTS | 2025年 / 15卷 / 01期
关键词
WGAN-GP; Genetic algorithms; Side-channel attacks; Cryptographic protocols; Data augmentation; Security optimization; GENERATIVE ADVERSARIAL NETWORKS; SECURITY; CHALLENGES; INTERNET;
D O I
10.1038/s41598-025-86118-4
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
This research introduces a novel hybrid cryptographic framework that combines traditional cryptographic protocols with advanced methodologies, specifically Wasserstein Generative Adversarial Networks with Gradient Penalty (WGAN-GP) and Genetic Algorithms (GA). We evaluated several cryptographic protocols, including AES-ECB, AES-GCM, ChaCha20, RSA, and ECC, against critical metrics such as security level, efficiency, side-channel resistance, and cryptanalysis resistance. Our findings demonstrate that this integrated approach significantly enhances both security and efficiency across all evaluated protocols. Notably, the AES-GCM algorithm exhibited superior performance, achieving minimal computation time and robust side-channel resistance. This study underscores the potential of leveraging machine learning and evolutionary algorithms to advance cryptographic protocol security and efficiency, laying a robust foundation for future advancements in cybersecurity.
引用
收藏
页数:24
相关论文
共 36 条
  • [1] Enhanced CNN Classification Capability for Small Rice Disease Datasets Using Progressive WGAN-GP: Algorithms and Applications
    Lu, Yang
    Tao, Xianpeng
    Zeng, Nianyin
    Du, Jiaojiao
    Shang, Rou
    REMOTE SENSING, 2023, 15 (07)
  • [2] Securing Software Cryptographic Primitives for Embedded Systems against Side Channel Attacks
    Agosta, Giovanni
    Barenghi, Alessandro
    Pelosi, Gerardo
    2014 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2014,
  • [3] Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks
    Bhasin, Shivam
    Guilley, Sylvain
    Sauvage, Laurent
    Danger, Jean-Luc
    TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 195 - 207
  • [4] The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks
    Agosta, Giovanni
    Barenghi, Alessandro
    Pelosi, Gerardo
    Scandale, Michele
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (08) : 1320 - 1333
  • [5] On-Chip Protection of Cryptographic ICs Against Physical Side Channel Attacks
    Nagata, Makoto
    2019 IEEE 13TH INTERNATIONAL CONFERENCE ON ASIC (ASICON), 2019,
  • [6] Protecting Cryptographic Libraries Against Side-Channel and Code-Reuse Attacks
    Tsoupidi, Rodothea Myrsini
    Troubitsyna, Elena
    Papadimitratos, Panos
    IEEE SECURITY & PRIVACY, 2024,
  • [7] A Survey of Prototype Side-channel Attacks Based on Machine Learning Algorithms for Cryptographic Chips
    Guo, Dongxin
    Chen, Kaiyan
    Hu, Xiaoyang
    Wei, Yanhai
    Li, Jianlong
    2018 INTERNATIONAL SEMINAR ON COMPUTER SCIENCE AND ENGINEERING TECHNOLOGY (SCSET 2018), 2019, 1176
  • [8] Side-channel cryptographic attacks using pseudo-boolean optimization
    Yossef Oren
    Avishai Wool
    Constraints, 2016, 21 : 616 - 645
  • [9] Side-channel cryptographic attacks using pseudo-boolean optimization
    Oren, Yossef
    Wool, Avishai
    CONSTRAINTS, 2016, 21 (04) : 616 - 645
  • [10] More Secure Internet of Things Using Robust Encryption Algorithms Against Side Channel Attacks
    Tawalbeh, Lo'ai A.
    Somani, Turki F.
    2016 IEEE/ACS 13TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2016,