Machine Learning Method with Applications in Hardware Security of Post-Quantum Cryptography

被引:5
作者
Yi, Haibo [1 ]
机构
[1] Shenzhen Polytech, Sch Artificial Intelligence, Shenzhen 518055, Peoples R China
关键词
Machine learning (ML); Artificial intelligence (AI); Hardware security; Side channel attack; Post-quantum cryptography; HASH-BASED SIGNATURES; SCHEME; STATE;
D O I
10.1007/s10723-023-09643-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning (ML) is the core of Artificial Intelligence (AI), and it is the fundamental way to make computer have intelligence. ML is a technology that uses algorithms to parse data, constantly learn, and make judgements and predictions about what happens. With the continuous development of ML technology, using ML algorithms to analyze the security of physical hardware has gradually become one of the hot spots in the research field. In the field of hardware security, post quantum cryptography is one of the research hotspots, e.g., multivariate cryptography. However, analyzing post-quantum signatures based on ML is still in the early stage. As substitutions of current used signatures, post-quantum signatures should fully consider side channel attack based on ML techniques so that they can be used in reality. In order to address such challenges, we present ML techniques to exploit the measurement of side channel attacks to post-quantum signatures. We propose a ML model for the measurement of side channel attacks. The efficiency of the proposed model is measured and it can be extended to analyze other similar signatures.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] Faster Isogenies for Post-quantum Cryptography: SIKE
    Elkhatib, Rami
    Koziel, Brian
    Azarderakhsh, Reza
    TOPICS IN CRYPTOLOGY, CT-RSA 2022, 2022, 13161 : 49 - 72
  • [32] A Performance Evaluation of IPsec with Post-Quantum Cryptography
    Bae, Seungyeon
    Chang, Yousung
    Park, Hyeongjin
    Kim, Minseo
    Shin, Youngjoo
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2022, 2023, 13849 : 249 - 266
  • [33] Post-Quantum Cryptography on FPGAs: The Niederreiter Cryptosystem
    Wang, Wen
    Szefer, Jakub
    Niederhagen, Ruben
    PROCEEDINGS OF THE 2018 GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI'18), 2018, : 371 - 371
  • [34] Post-quantum cryptography: lattice identification schemes
    Silva, Rosemberg
    Cayrel, Pierre-Louis
    Buchmann, Johannes
    PUBLICATIONES MATHEMATICAE-DEBRECEN, 2011, 79 (3-4): : 729 - 748
  • [35] Post-quantum signature schemes for efficient hardware implementation
    Moldovyan, Dmitriy N.
    Moldovyan, Alexandr A.
    Moldovyan, Nikolay A.
    MICROPROCESSORS AND MICROSYSTEMS, 2021, 80
  • [36] Efficient Hardware Arithmetic for Inverted Binary Ring-LWE Based Post-Quantum Cryptography
    Imana, Jose L.
    He, Pengzhou
    Bao, Tianyou
    Tu, Yazheng
    Xie, Jiafeng
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2022, 69 (08) : 3297 - 3307
  • [37] Quantum and Post-Quantum Security in Future Networks
    Sanon, Sogo Pierre
    Alzalam, Ihab
    Schotten, Hans D.
    2023 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2024,
  • [38] Network coding-based post-quantum cryptography
    Cohen A.
    D’Oliveira R.G.L.
    Salamatian S.
    Médard M.
    IEEE Journal on Selected Areas in Information Theory, 2021, 2 (01): : 49 - 64
  • [39] Post-quantum Cryptography: Code-Based Signatures
    Cayrel, Pierre-Louis
    Meziani, Mohammed
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 82 - 99
  • [40] A Survey of Post-Quantum Cryptography: Start of a New Race
    Dam, Duc-Thuan
    Tran, Thai-Ha
    Hoang, Van-Phuc
    Pham, Cong-Kha
    Hoang, Trong-Thuc
    CRYPTOGRAPHY, 2023, 7 (03)