Loading…

Security analysis of neural cryptography implementation

Neural cryptography is a recent approach that aims to solve the key exchange problem with non classical computing through neural networks training on the same input patterns. Recently, there is a great interest in the cryptographic community to study the security of implementations of cryptographic...

Full description

Saved in:
Bibliographic Details
Main Authors: Allam, Ahmed M., Abbas, Hazem M., El-Kharashi, M. Watheq
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Neural cryptography is a recent approach that aims to solve the key exchange problem with non classical computing through neural networks training on the same input patterns. Recently, there is a great interest in the cryptographic community to study the security of implementations of cryptographic protocols. Timing analysis and power analysis are the most known and successful mechanisms to obtain information about the protocols secret parameters without the need to solve a hard problem. Some parts of the circuits needed for the protocol are implemented and synthesized in VHDL. HSPICE simulator is used to measure the power consumption with different inputs. In this paper, the information leakage through the learning process is investigated. It is also shown how this information can be used to reduce the complexity of the genetic attack, a neural cryptography known attack strategy. To overcome these vulnerabilities some solutions are proposed to make the neural key exchange protocol immune against this simple power analysis attack. In addition, Trojan insertion attacks are introduced.
ISSN:1555-5798
2154-5952
DOI:10.1109/PACRIM.2013.6625473