Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissions

被引:4
|
作者
Padilla, Jonathan Martinez [1 ,2 ]
Meyer-Baese, Uwe [1 ,2 ]
Foo, Simon [1 ,2 ]
机构
[1] Florida State Univ, FAMU FSU Coll Engn, 2525 Pottsdamer St, Tallahassee, FL 32310 USA
[2] Florida State Univ, Machine Intelligence Lab, 2525 Pottsdamer St, Tallahassee, FL 32310 USA
关键词
Tree parity machine; Side channel; Machine learning; Neural networks; Microcontrollers; Security evaluation;
D O I
10.1186/s13635-018-0073-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, side-channel attacks (SCAs) are considered as a security metric for the implementation of hybrid cryptosystems utilizing the neural network-based Tree Parity Re-Keying Machines (TPM). A virtual study is presented within the MATLAB environment that explores various scenarios in which the TPM may be compromised. Performance metrics are evaluated to model possible embedded system implementations. A new algorithm is proposed and coined as Man-in-the-Middle Power Analysis (MIMPA) as a means to copy the TPM's generated keys. It is shown how the algorithm can identify vulnerabilities in the physical device in which the cryptosystem is implemented by using its power emissions. Finally, a machine learning approach is used to identify the capabilities of neural networks to recognize properties of keys produced in the TPM as they are transferred to an encryption algorithm. The results show that physical exploits of TPM implementations in embedded systems can be identified and accounted for before a final release. The experiments and data acquisition is demonstrated with an implementation of a TPM-AES hybrid cryptosystem in an AVR microcontroller.
引用
收藏
页数:16
相关论文
共 34 条
  • [1] Fresh Re-Keying with Strong PUFs: a New Approach to Side-Channel Security
    Xi, Xiaodan
    Aysu, Aydin
    Orshansky, Michael
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2018, : 118 - 125
  • [2] Side-Channel Analysis for the Re-Keying Protocol of Bluetooth Low Energy
    Pei Cao
    Chi Zhang
    Xiang-Jun Lu
    Hai-Ning Lu
    Da-Wu Gu
    Journal of Computer Science and Technology, 2023, 38 : 1132 - 1148
  • [3] Side-Channel Analysis for the Re-Keying Protocol of Bluetooth Low Energy
    Cao, Pei
    Zhang, Chi
    Lu, Xiang-Jun
    Lu, Hai-Ning
    Gu, Da-Wu
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2023, 38 (05) : 1132 - 1148
  • [4] Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
    Medwed, Marcel
    Standaert, Francois-Xavier
    Grossschaedl, Johann
    Regazzoni, Francesco
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 279 - +
  • [5] ASCON hardware implementations and side-channel evaluation
    Gross, Hannes
    Wenger, Erich
    Dobraunig, Christoph
    Ehrenhoefer, Christoph
    MICROPROCESSORS AND MICROSYSTEMS, 2017, 52 : 470 - 479
  • [6] Fast Side-Channel Security Evaluation of ECC Implementations Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder
    Azouaoui, Melissa
    Poussier, Romain
    Standaert, Francois-Xavier
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 25 - 42
  • [7] Quantitative Evaluation of Side-channel Security
    Li, Huiyun
    Chen, Tingding
    Wu, Keke
    Yu, Fengqi
    2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 456 - 460
  • [8] High Order Side-Channel Security for Elliptic-Curve Implementations
    Belaïd, Sonia
    Rivain, Matthieu
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2023 (01): : 238 - 276
  • [9] Security Oriented Design Framework for EM Side-Channel Protection in RTL Implementations
    He, Jiaji
    Ma, Haocheng
    Panoff, Max
    Wang, Hanning
    Zhao, Yiqiang
    Liu, Leibo
    Guo, Xiaolong
    Jin, Yier
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (08) : 2421 - 2434
  • [10] Design for EM Side-Channel Security through Quantitative Assessment of RTL Implementations
    He, Jiaji
    Ma, Haocheng
    Guo, Xialong
    Zhao, Yiqiang
    Jin, Yier
    2020 25TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC 2020, 2020, : 62 - 67