Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissions

被引:4
作者
Padilla, Jonathan Martinez [1 ,2 ]
Meyer-Baese, Uwe [1 ,2 ]
Foo, Simon [1 ,2 ]
机构
[1] Florida State Univ, FAMU FSU Coll Engn, 2525 Pottsdamer St, Tallahassee, FL 32310 USA
[2] Florida State Univ, Machine Intelligence Lab, 2525 Pottsdamer St, Tallahassee, FL 32310 USA
关键词
Tree parity machine; Side channel; Machine learning; Neural networks; Microcontrollers; Security evaluation;
D O I
10.1186/s13635-018-0073-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, side-channel attacks (SCAs) are considered as a security metric for the implementation of hybrid cryptosystems utilizing the neural network-based Tree Parity Re-Keying Machines (TPM). A virtual study is presented within the MATLAB environment that explores various scenarios in which the TPM may be compromised. Performance metrics are evaluated to model possible embedded system implementations. A new algorithm is proposed and coined as Man-in-the-Middle Power Analysis (MIMPA) as a means to copy the TPM's generated keys. It is shown how the algorithm can identify vulnerabilities in the physical device in which the cryptosystem is implemented by using its power emissions. Finally, a machine learning approach is used to identify the capabilities of neural networks to recognize properties of keys produced in the TPM as they are transferred to an encryption algorithm. The results show that physical exploits of TPM implementations in embedded systems can be identified and accounted for before a final release. The experiments and data acquisition is demonstrated with an implementation of a TPM-AES hybrid cryptosystem in an AVR microcontroller.
引用
收藏
页数:16
相关论文
共 24 条
[1]   Quantization analysis and enhancement of a VLSI gradient-based motion estimation architecture [J].
Botella, Guillermo ;
Meyer-Baese, Uwe ;
Garcia, Antonio ;
Rodriguez, Manuel .
DIGITAL SIGNAL PROCESSING, 2012, 22 (06) :1174-1187
[2]   Robust Bioinspired Architecture for Optical-Flow Computation [J].
Botella, Guillermo ;
Garcia, Antonio ;
Rodriguez-Alvarez, Manuel ;
Ros, Eduardo ;
Meyer-Baese, Uwe ;
Molina, Maria C. .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2010, 18 (04) :616-629
[3]  
Brier E., 2002, Public Key Cryptography. 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002. Proceedings (Lecture Notes in Computer Science Vol.2274), P335
[4]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[5]  
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
[6]  
Daemen J., 2013, DESIGN RIJNDAEL AES
[7]  
Friedman Jeffrey, 1972, NSA CRYPTOLOGIC SPEC, V35, P76
[8]  
GUNTHER CG, 1990, LECT NOTES COMPUT SC, V434, P29
[9]   Machine learning in side-channel analysis: a first study [J].
Hospodar, Gabriel ;
Gierlichs, Benedikt ;
De Mulder, Elke ;
Verbauwhede, Ingrid ;
Vandewalle, Joos .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (04) :293-302
[10]  
Inc TekVISA, TEKVISA VERS 1 1 PRO