Is It Possible to Hide My Key into Deep Neural Network?

  • Taehyuk Kim
  • , Taek Young Youn
  • , Dooho Choi*
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The use of cryptographic functions has become vital for various devices, such as PCs, smart phones, drones, and smart appliances; however, the secure storage of cryptographic keys (or passwords) is a major issue. One way to securely store such a key is to register the key using secret data such as biometric data and then regenerate the key whenever it is needed. In this paper, we present a novel methodology for hiding cryptographic keys inside a deep neural network (DNN), and is termed as the DNN-based key hiding scheme. In this method, DNNs are constructed and trained with noisy data to hide the key within the network. To prove that our methodology works in practice, we propose an example of the DNN-based key hiding scheme and prove its correctness. For its robustness, we propose two basic security analysis tools to be able to check the example’s security. To the best of our knowledge, this is the first attempt of its kind.

Original languageEnglish
Title of host publicationInformation Security Applications - 20th International Conference, WISA 2019, Revised Selected Papers
EditorsIlsun You
PublisherSpringer
Pages259-272
Number of pages14
ISBN (Print)9783030393021
DOIs
Publication statusPublished - 2020
Externally publishedYes
Event20th World Conference on Information Security Applications, WISA 2019 - Jeju Island, Korea, Republic of
Duration: 2019 Aug 212019 Aug 24

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11897 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference20th World Conference on Information Security Applications, WISA 2019
Country/TerritoryKorea, Republic of
CityJeju Island
Period19/8/2119/8/24

Bibliographical note

Publisher Copyright:
© 2020, Springer Nature Switzerland AG.

Keywords

  • Deep neural network
  • Key generation
  • Key hiding
  • Noisy data
  • Physical unclonable function

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Is It Possible to Hide My Key into Deep Neural Network?'. Together they form a unique fingerprint.

Cite this