DocumentCode :
3433640
Title :
Security analysis of neural cryptography implementation
Author :
Allam, Ahmed M. ; Abbas, Hazem M. ; El-Kharashi, M. Watheq
Author_Institution :
Dept. of Comput. & Syst. Eng., Ain Shams Univ., Cairo, Egypt
fYear :
2013
fDate :
27-29 Aug. 2013
Firstpage :
195
Lastpage :
199
Abstract :
Neural cryptography is a recent approach that aims to solve the key exchange problem with non classical computing through neural networks training on the same input patterns. Recently, there is a great interest in the cryptographic community to study the security of implementations of cryptographic protocols. Timing analysis and power analysis are the most known and successful mechanisms to obtain information about the protocols secret parameters without the need to solve a hard problem. Some parts of the circuits needed for the protocol are implemented and synthesized in VHDL. HSPICE simulator is used to measure the power consumption with different inputs. In this paper, the information leakage through the learning process is investigated. It is also shown how this information can be used to reduce the complexity of the genetic attack, a neural cryptography known attack strategy. To overcome these vulnerabilities some solutions are proposed to make the neural key exchange protocol immune against this simple power analysis attack. In addition, Trojan insertion attacks are introduced.
Keywords :
cryptographic protocols; hardware description languages; invasive software; learning (artificial intelligence); HSPICE simulator; Trojan insertion attacks; VHDL; attack strategy; cryptographic protocols; genetic attack; input patterns; key exchange problem; learning process; neural cryptography; neural key exchange protocol; neural networks training; non lassical computing; power analysis attack; power consumption; the information leakage; timing analysis; Complexity theory; Cryptography; Power demand; Protocols; Ring oscillators; Training; Vectors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications, Computers and Signal Processing (PACRIM), 2013 IEEE Pacific Rim Conference on
Conference_Location :
Victoria, BC
ISSN :
1555-5798
Type :
conf
DOI :
10.1109/PACRIM.2013.6625473
Filename :
6625473
Link To Document :
بازگشت