Machine Learning Method with Applications in Hardware Security of Post-Quantum Cryptography

被引:5
|
作者
Yi, Haibo [1 ]
机构
[1] Shenzhen Polytech, Sch Artificial Intelligence, Shenzhen 518055, Peoples R China
关键词
Machine learning (ML); Artificial intelligence (AI); Hardware security; Side channel attack; Post-quantum cryptography; HASH-BASED SIGNATURES; SCHEME; STATE;
D O I
10.1007/s10723-023-09643-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning (ML) is the core of Artificial Intelligence (AI), and it is the fundamental way to make computer have intelligence. ML is a technology that uses algorithms to parse data, constantly learn, and make judgements and predictions about what happens. With the continuous development of ML technology, using ML algorithms to analyze the security of physical hardware has gradually become one of the hot spots in the research field. In the field of hardware security, post quantum cryptography is one of the research hotspots, e.g., multivariate cryptography. However, analyzing post-quantum signatures based on ML is still in the early stage. As substitutions of current used signatures, post-quantum signatures should fully consider side channel attack based on ML techniques so that they can be used in reality. In order to address such challenges, we present ML techniques to exploit the measurement of side channel attacks to post-quantum signatures. We propose a ML model for the measurement of side channel attacks. The efficiency of the proposed model is measured and it can be extended to analyze other similar signatures.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Machine Learning Method with Applications in Hardware Security of Post-Quantum Cryptography
    Haibo Yi
    Journal of Grid Computing, 2023, 21
  • [2] Applications of Post-Quantum Cryptography
    Bagirovs, Emils
    Provodin, Grigory
    Sipola, Tuomo
    Hautamaki, Jari
    PROCEEDINGS OF THE 23RD EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY, ECCWS 2024, 2024, 23 : 49 - 57
  • [3] A Note on Quantum Security for Post-Quantum Cryptography
    Song, Fang
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 246 - 265
  • [4] A note on quantum security for post-quantum cryptography
    Song, Fang
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 : 246 - 265
  • [5] A Flexible and Scalable NTT Hardware: Applications from Homomorphically Encrypted Deep Learning to Post-Quantum Cryptography
    Mert, Ahmet Can
    Karabulut, Emre
    Ozturk, Erdinc
    Savas, Erkay
    Becchi, Michela
    Aysu, Aydin
    PROCEEDINGS OF THE 2020 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2020), 2020, : 346 - 351
  • [6] Hardware Design and Implementation of Post-Quantum Cryptography Kyber
    Zeng, Qingru
    Li, Quanxin
    Zhao, Baoze
    Jiao, Han
    Huang, Yihua
    2022 IEEE HIGH PERFORMANCE EXTREME COMPUTING VIRTUAL CONFERENCE (HPEC), 2022,
  • [7] Lightweight, Post-Quantum Secure Cryptography Based on Ascon: Hardware Implementation in Automotive Applications
    Nguyen, Hai Phong
    Chen, Yuhua
    ELECTRONICS, 2024, 13 (22)
  • [8] Post-Quantum Cryptography
    Monroe, Don
    COMMUNICATIONS OF THE ACM, 2023, 66 (02) : 15 - 17
  • [9] Post-quantum cryptography
    Bernstein, Daniel J.
    Lange, Tanja
    NATURE, 2017, 549 (7671) : 188 - 194
  • [10] Post-quantum cryptography
    Daniel J. Bernstein
    Tanja Lange
    Nature, 2017, 549 : 188 - 194