Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissions

被引:4
|
作者
Padilla, Jonathan Martinez [1 ,2 ]
Meyer-Baese, Uwe [1 ,2 ]
Foo, Simon [1 ,2 ]
机构
[1] Florida State Univ, FAMU FSU Coll Engn, 2525 Pottsdamer St, Tallahassee, FL 32310 USA
[2] Florida State Univ, Machine Intelligence Lab, 2525 Pottsdamer St, Tallahassee, FL 32310 USA
关键词
Tree parity machine; Side channel; Machine learning; Neural networks; Microcontrollers; Security evaluation;
D O I
10.1186/s13635-018-0073-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, side-channel attacks (SCAs) are considered as a security metric for the implementation of hybrid cryptosystems utilizing the neural network-based Tree Parity Re-Keying Machines (TPM). A virtual study is presented within the MATLAB environment that explores various scenarios in which the TPM may be compromised. Performance metrics are evaluated to model possible embedded system implementations. A new algorithm is proposed and coined as Man-in-the-Middle Power Analysis (MIMPA) as a means to copy the TPM's generated keys. It is shown how the algorithm can identify vulnerabilities in the physical device in which the cryptosystem is implemented by using its power emissions. Finally, a machine learning approach is used to identify the capabilities of neural networks to recognize properties of keys produced in the TPM as they are transferred to an encryption algorithm. The results show that physical exploits of TPM implementations in embedded systems can be identified and accounted for before a final release. The experiments and data acquisition is demonstrated with an implementation of a TPM-AES hybrid cryptosystem in an AVR microcontroller.
引用
收藏
页数:16
相关论文
共 34 条
  • [21] Side-Channel Analysis for Searchable Encryption System and its Security Evaluation
    Yoshikawa, Masaya
    Ikezaki, Yoshiya
    Nozaki, Yusuke
    2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019), 2019, : 465 - 469
  • [22] Machine Learning For Security: The Case of Side-Channel Attack Detection at Run-time
    Mushtaq, Maria
    Akram, Ayaz
    Bhatti, Muhammad Khurram
    Chaudhry, Maham
    Yousaf, Muneeb
    Farooq, Umer
    Lapotre, Vianney
    Gogniat, Guy
    2018 25TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS (ICECS), 2018, : 485 - 488
  • [23] Machine-Learning Assisted Side-Channel Attacks on RNS ECC Implementations Using Hybrid Feature Engineering
    Mukhtar, Naila
    Papachristodoulou, Louiza
    Fournaris, Apostolos P.
    Batina, Lejla
    Kong, Yinan
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2022, 2022, 13211 : 3 - 28
  • [24] Practical Side-Channel Based Model Extraction Attack on Tree-Based Machine Learning Algorithm
    Jap, Dirmanto
    Yli-Mayry, Ville
    Ito, Akira
    Ueno, Rei
    Bhasin, Shivam
    Homma, Naofumi
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 93 - 105
  • [25] Security Evaluation of Cryptographic Modules against Side-Channel Attack using a Biased Data Set
    Matsubayashi, Masato
    Guntur, Hendra
    Satoh, Akashi
    2017 IEEE 6TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 2017,
  • [26] Evaluation of Machine Learning-based Detection against Side-Channel Attacks on Autonomous Vehicle
    Wang, Han
    Salehi, Soheil
    Sayadi, Hossein
    Sasan, Avesta
    Mohsenin, Tinoosh
    Manoj, P. D. Sai
    Rafatirad, Setareh
    Homayoun, Houman
    2021 IEEE 3RD INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE CIRCUITS AND SYSTEMS (AICAS), 2021,
  • [27] Measurement of Side-Channel Information from Cryptographic Devices on Security Evaluation Platform: Demonstration of SPACES Project
    Endo, Sho
    Hayashi, Yu-ichi
    Homma, Naofumi
    Aoki, Takafumi
    Katashita, Toshihiro
    Hori, Yohei
    Sakiyama, Kazuo
    Nagata, Makoto
    Danger, Jean-Luc
    Le, Thanh-Ha
    Sabet, Pirouz Bazargan
    2012 PROCEEDINGS OF SICE ANNUAL CONFERENCE (SICE), 2012, : 313 - 316
  • [28] Machine-Learning-Based Side-Channel Evaluation of Elliptic-Curve Cryptographic FPGA Processor
    Mukhtar, Naila
    Mehrabi, Mohamad Ali
    Kong, Yinan
    Anjum, Ashiq
    APPLIED SCIENCES-BASEL, 2019, 9 (01):
  • [29] How Bad Are Bad Templates? Optimistic Design-Stage Side-Channel Security Evaluation and its Cost
    Breuer, Rinat
    Levi, Itamar
    CRYPTOGRAPHY, 2020, 4 (04) : 1 - 17
  • [30] Side-channel AttacK User Reference Architecture Board SAKURA-W for Security Evaluation of IC Card
    Matsubayashi, Masato
    Satoh, Akashi
    2015 IEEE 4TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 2015, : 565 - 569