...
首页> 外文期刊>EURASIP journal on information security >Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissions
【24h】

Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissions

机译:利用侧通道排放的树奇偶校验重新键控机器的安全性评估

获取原文

摘要

In this work, side-channel attacks (SCAs) are considered as a security metric for the implementation of hybrid cryptosystems utilizing the neural network-based Tree Parity Re-Keying Machines (TPM). A virtual study is presented within the MATLAB environment that explores various scenarios in which the TPM may be compromised. Performance metrics are evaluated to model possible embedded system implementations. A new algorithm is proposed and coined as Man-in-the-Middle Power Analysis (MIMPA) as a means to copy the TPM’s generated keys. It is shown how the algorithm can identify vulnerabilities in the physical device in which the cryptosystem is implemented by using its power emissions. Finally, a machine learning approach is used to identify the capabilities of neural networks to recognize properties of keys produced in the TPM as they are transferred to an encryption algorithm. The results show that physical exploits of TPM implementations in embedded systems can be identified and accounted for before a final release. The experiments and data acquisition is demonstrated with an implementation of a TPM-AES hybrid cryptosystem in an AVR microcontroller.
机译:在这项工作中,侧通道攻击(SCAS)被视为利用基于神经网络的树奇偶校验重新键控机(TPM)的混合密码系统的安全度量。在MATLAB环境中介绍虚拟研究,该环境探讨了TPM可能会受到影响的各种场景。评估性能指标以模拟可能的嵌入式系统实现。提出了一种新的算法,并作为中间功率分析(MIMPA)作为复制TPM生成键的方法。显示算法如何通过使用其电力发射来识别密码系统的物理设备中的漏洞。最后,使用机器学习方法来识别神经网络的能力,以识别在TPM中产生的键的属性,因为它们被传送到加密算法。结果表明,在最终版本之前,可以识别嵌入式系统中的TPM实现的物理利用。通过在AVR微控制器中实现TPM-AES混合密码系统的实验和数据采集。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号