Abstract
The use of cryptographic functions has become vital for various devices, such as PCs, smart phones, drones, and smart appliances; however, the secure storage of cryptographic keys (or passwords) is a major issue. One way to securely store such a key is to register the key using secret data such as biometric data and then regenerate the key whenever it is needed. In this paper, we present a novel methodology for hiding cryptographic keys inside a deep neural network (DNN), and is termed as the DNN-based key hiding scheme. In this method, DNNs are constructed and trained with noisy data to hide the key within the network. To prove that our methodology works in practice, we propose an example of the DNN-based key hiding scheme and prove its correctness. For its robustness, we propose two basic security analysis tools to be able to check the example’s security. To the best of our knowledge, this is the first attempt of its kind.
| Original language | English |
|---|---|
| Title of host publication | Information Security Applications - 20th International Conference, WISA 2019, Revised Selected Papers |
| Editors | Ilsun You |
| Publisher | Springer |
| Pages | 259-272 |
| Number of pages | 14 |
| ISBN (Print) | 9783030393021 |
| DOIs | |
| Publication status | Published - 2020 |
| Externally published | Yes |
| Event | 20th World Conference on Information Security Applications, WISA 2019 - Jeju Island, Korea, Republic of Duration: 2019 Aug 21 → 2019 Aug 24 |
Publication series
| Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
|---|---|
| Volume | 11897 LNCS |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | 20th World Conference on Information Security Applications, WISA 2019 |
|---|---|
| Country/Territory | Korea, Republic of |
| City | Jeju Island |
| Period | 19/8/21 → 19/8/24 |
Bibliographical note
Publisher Copyright:© 2020, Springer Nature Switzerland AG.
Keywords
- Deep neural network
- Key generation
- Key hiding
- Noisy data
- Physical unclonable function
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science