Skip to main content

2020 | OriginalPaper | Buchkapitel

Is It Possible to Hide My Key into Deep Neural Network?

verfasst von : Taehyuk Kim, Taek-Young Youn, Dooho Choi

Erschienen in: Information Security Applications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The use of cryptographic functions has become vital for various devices, such as PCs, smart phones, drones, and smart appliances; however, the secure storage of cryptographic keys (or passwords) is a major issue. One way to securely store such a key is to register the key using secret data such as biometric data and then regenerate the key whenever it is needed. In this paper, we present a novel methodology for hiding cryptographic keys inside a deep neural network (DNN), and is termed as the DNN-based key hiding scheme. In this method, DNNs are constructed and trained with noisy data to hide the key within the network. To prove that our methodology works in practice, we propose an example of the DNN-based key hiding scheme and prove its correctness. For its robustness, we propose two basic security analysis tools to be able to check the example’s security. To the best of our knowledge, this is the first attempt of its kind.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008)MathSciNetCrossRef Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008)MathSciNetCrossRef
3.
Zurück zum Zitat Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 28–36 (1999) Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 28–36 (1999)
4.
Zurück zum Zitat Jin, Z., Teoh, A., Goi, B., Tay, Y.: Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation. Pattern Recogn. 56(13), 50–62 (2016) CrossRef Jin, Z., Teoh, A., Goi, B., Tay, Y.: Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation. Pattern Recogn. 56(13), 50–62 (2016) CrossRef
6.
Zurück zum Zitat Nakouri, I., Hamdi, M., Kim, T.H.: Chaotic construction of cryptographic keys based on biometric data. In: 2016 International Conference on High Performance Computing & Simulation (HPCS), pp. 509–516 (2016) Nakouri, I., Hamdi, M., Kim, T.H.: Chaotic construction of cryptographic keys based on biometric data. In: 2016 International Conference on High Performance Computing & Simulation (HPCS), pp. 509–516 (2016)
7.
Zurück zum Zitat Itkis, G., Chandar, V., Fuller, B.W., Campbell, J.P., Cunningham, R.K.: Iris biometric security challenges and possible solutions: for your eyes only? Using the iris as a key. IEEE Signal Process. Mag. 32(5), 42–53 (2015)CrossRef Itkis, G., Chandar, V., Fuller, B.W., Campbell, J.P., Cunningham, R.K.: Iris biometric security challenges and possible solutions: for your eyes only? Using the iris as a key. IEEE Signal Process. Mag. 32(5), 42–53 (2015)CrossRef
8.
Zurück zum Zitat Mariño, R.Á., Álvarez, F.H., Encinas, L.H.: A crypto-biometric scheme based on iris-templates with fuzzy extractors. Inf. Sci. 195, 91–102 (2012)CrossRef Mariño, R.Á., Álvarez, F.H., Encinas, L.H.: A crypto-biometric scheme based on iris-templates with fuzzy extractors. Inf. Sci. 195, 91–102 (2012)CrossRef
9.
Zurück zum Zitat Sutcu, Y., Li, Q., Memon, N.: Design and analysis of fuzzy extractors for faces. In: Optics and Photonics in Global Homeland Security V and Biometric Technology for Human Identification VI, pp. 509–516 (2009) Sutcu, Y., Li, Q., Memon, N.: Design and analysis of fuzzy extractors for faces. In: Optics and Photonics in Global Homeland Security V and Biometric Technology for Human Identification VI, pp. 509–516 (2009)
10.
Zurück zum Zitat Leng, L., Teoh, A.: Alignment-free row-co-occurrence cancelable palmprint fuzzy vault. Pattern Recogn. 48, 2290–2303 (2015)CrossRef Leng, L., Teoh, A.: Alignment-free row-co-occurrence cancelable palmprint fuzzy vault. Pattern Recogn. 48, 2290–2303 (2015)CrossRef
11.
Zurück zum Zitat Choi, D., Seo, S.H., Oh, Y.S., Kang, Y.: Two-factor fuzzy commitment for unmanned IoT devices security. IEEE Internet Things J. 6, 335–348 (2019)CrossRef Choi, D., Seo, S.H., Oh, Y.S., Kang, Y.: Two-factor fuzzy commitment for unmanned IoT devices security. IEEE Internet Things J. 6, 335–348 (2019)CrossRef
12.
Zurück zum Zitat Conti, V., Rundo, L., Militello, C., Mauri, G., Vitabile, S.: Resource-efficient hardware implementation of a neural-based node for automatic fingerprint classification. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 8, 19–36 (2017) Conti, V., Rundo, L., Militello, C., Mauri, G., Vitabile, S.: Resource-efficient hardware implementation of a neural-based node for automatic fingerprint classification. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 8, 19–36 (2017)
13.
Zurück zum Zitat Li, Y., Ma, W.: Applications of artificial neural networks in financial economics: a survey. In: 2010 International Symposium on Computational Intelligence and Design, pp. 211–214 (2010) Li, Y., Ma, W.: Applications of artificial neural networks in financial economics: a survey. In: 2010 International Symposium on Computational Intelligence and Design, pp. 211–214 (2010)
14.
Zurück zum Zitat De Mulder, W., Bethard, S., Moens, M.-F.: A survey on the application of recurrent neural networks to statistical language modeling. Comput. Speech Lang. 30, 61–98 (2015)CrossRef De Mulder, W., Bethard, S., Moens, M.-F.: A survey on the application of recurrent neural networks to statistical language modeling. Comput. Speech Lang. 30, 61–98 (2015)CrossRef
15.
Zurück zum Zitat Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. Advances in Neural Information Processing Systems, pp. 1097–1105 (2012) Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. Advances in Neural Information Processing Systems, pp. 1097–1105 (2012)
16.
Zurück zum Zitat Nair, V., Hinton, G.E.: Rectified linear units improve restricted Boltzmann machines. In: Proceedings of the 27th International Conference on Machine Learning (ICML-10), pp. 807–814 (2010) Nair, V., Hinton, G.E.: Rectified linear units improve restricted Boltzmann machines. In: Proceedings of the 27th International Conference on Machine Learning (ICML-10), pp. 807–814 (2010)
17.
Zurück zum Zitat Harrington, P.: Machine Learning in Action. Manning, Greenwich (2012) Harrington, P.: Machine Learning in Action. Manning, Greenwich (2012)
18.
Zurück zum Zitat Wallrabenstein, J.R.: Practical and secure IoT device authentication using physical unclonable functions. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), pp. 99–106 (2016) Wallrabenstein, J.R.: Practical and secure IoT device authentication using physical unclonable functions. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), pp. 99–106 (2016)
19.
Zurück zum Zitat Abadi, M., et al.: TensorFlow: a system for large-scale machine learning. In: 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2016), pp. 265–283 (2016) Abadi, M., et al.: TensorFlow: a system for large-scale machine learning. In: 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2016), pp. 265–283 (2016)
Metadaten
Titel
Is It Possible to Hide My Key into Deep Neural Network?
verfasst von
Taehyuk Kim
Taek-Young Youn
Dooho Choi
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-39303-8_20