首页> 外文会议>Cryptographic hardware and embedded systems - CHES 2010 >Analysis and Improvement of the Random Delay Countermeasure of CHES 2009
【24h】

Analysis and Improvement of the Random Delay Countermeasure of CHES 2009

机译:CHES 2009随机延迟对策的分析与改进

获取原文
获取原文并翻译 | 示例

摘要

Random delays are often inserted in embedded software to protect against side-channel and fault attacks. At CHES 2009 a new method for generation of random delays was described that increases the attacker's uncertainty about the position of sensitive operations. In this paper we show that the CHES 2009 method is less secure than claimed. We describe an improved method for random delay generation which does not suffer from the same security weakness. We also show that the paper's criterion to measure the security of random delays can be misleading, so we introduce a new criterion for random delays which is directly connected to the number of acquisitions required to break an implementation. We mount a power analysis attack against an 8-bit implementation of the improved method verifying its higher security in practice.
机译:通常将随机延迟插入嵌入式软件中,以防止出现旁通道和故障攻击。在CHES 2009上,介绍了一种用于生成随机延迟的新方法,该方法增加了攻击者对敏感操作位置的不确定性。在本文中,我们证明了CHES 2009方法的安全性不如要求的安全。我们描述了一种改进的随机延迟生成方法,该方法不会遭受相同的安全漏洞。我们还表明,衡量随机延迟安全性的论文准则可能会产生误导,因此我们为随机延迟引入了一种新准则,该准则直接与破坏实现所需的获取次数相关。我们针对改进方法的8位实现实施了功耗分析攻击,以在实践中验证其更高的安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号