Inicio  /  Applied Sciences  /  Vol: 13 Par: 21 (2023)  /  Artículo
ARTÍCULO
TITULO

A Secret Key Classification Framework of Symmetric Encryption Algorithm Based on Deep Transfer Learning

Xiaotong Cui    
Hongxin Zhang    
Xing Fang    
Yuanzhen Wang    
Danzhi Wang    
Fan Fan and Lei Shu    

Resumen

The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key information, which leads to security vulnerabilities. In traditional encryption algorithms, the length of the key greatly affects the upper limit of its security against cracking. Regarding side-channel attacks on long-key algorithms, traditional template attack methods characterize the energy traces using multivariate Gaussian distribution during the template construction phase. The exhaustive key-guessing process is expected to consume a significant amount of time and computational resources. Therefore, to analyze the effectiveness of obtaining key values from the side information of password devices, we propose an innovative attack method based on a divide-and-conquer logical structure, targeting semi-bytes. We construct a collection of key classification submodules with symmetric correlations. By integrating a differential network model for byte-block sets and an end-to-end direct attack method, we form a holistic symmetric decision framework and propose a key classification structure based on deep transfer learning. This structure consists of three main parts: side information data acquisition, analysis of key-value effectiveness, and determination of attack positions. It employs multiple parallel symmetric subnetworks, effectively improving attack efficiency and reducing the key enumeration range. Experimental results show that the optimal attack accuracy of the network model can reach 91%, with an average attack accuracy of 78%. It overcomes overfitting issues under small sample dataset conditions.

 Artículos similares

       
 
Chun Zhou, Yu Zhou, Yangbin Xu, Yang Wang, Yifei Lu, Musheng Jiang, Xiaoxu Zhang and Wansu Bao    
The decoy state quantum key distribution (QKD) protocol is proven to be an effective strategy against the photon number splitting attack. It was shown that the 1-decoy state protocol, easier to implement in the practical QKD system, outperforms the 2-dec... ver más
Revista: Applied Sciences

 
Jintao Rao and Zhe Cui    
The SM4 algorithm is widely used to ensure the security of data transmission. The traditional chosen plaintext power attacks against SM4 usually need to analyze four rounds power traces in turn to recover the secret key. In this paper, we propose a new c... ver más
Revista: Applied Sciences

 
Hayder Najm,Haider K. Hoomod,Rehab Hassan     Pág. pp. 184 - 199
The concept Web of Things (WoT) goes well beyond the emphasis on the Internet as a means of sharing data, instead of introducing all resources and connections involving computers, data, and people to the Web. It, therefore, focuses on a range of problems... ver más

 
Mohammad Nasim Imtiaz Khan, Shivam Bhasin, Bo Liu, Alex Yuan, Anupam Chattopadhyay and Swaroop Ghosh    
Emerging Non-Volatile Memories (NVMs) such as Magnetic RAM (MRAM), Spin-Transfer Torque RAM (STTRAM), Phase Change Memory (PCM) and Resistive RAM (RRAM) are very promising due to their low (static) power operation, high scalability and high performance. ... ver más

 
Natasha Tanzila Monalisa,Shinthi Tasnim Himi,Nayeema Ferdous,Md. Ezharul Islam,Anup Majumder     Pág. pp. 97 - 112
Though in this modern society men and women are said to be given equal rights, having no gender discrimination, women are still considered weak and endlessly facing rape, domestic violence, eve-teasing, workplace violence, physical assault, cyberbullying... ver más