首页> 外文会议>International Conference Mixed Design of Integrated Circuits Systems >Implementation of the PRESENT-80 block cipher and analysis of its vulnerability to Side Channel Attacks Exploiting Static Power
【24h】

Implementation of the PRESENT-80 block cipher and analysis of its vulnerability to Side Channel Attacks Exploiting Static Power

机译:PRESENT-80分组密码的实现及其对利用静态电源的侧信道攻击的脆弱性分析

获取原文

摘要

In this work, the implementation of the PRESENT-80 block cipher in a 40nm CMOS technology, and its vulnerability to Side Channel Attacks Exploiting Static Power is investigated. In the last two decades, several countermeasures to thwart DPA/CPA attacks based on the exploitation of dynamic power consumption have been proposed. In particular, WDDL logic style is a gate-level countermeasure, to Power Analysis Attacks exploiting dynamic Power. It has been demonstrated that, in deep sub-micron technologies, the static power consumption is no more negligible as in the past and malicious attackers can benefit from the dependability of the static power consumption on the processed data: Leakage Power Analysis (LPA) has been proposed to recover sensible information. The possibility to recover the secret key from a protected secure implementation exploiting static power is not a minor threat, and we analyze this vulnerability with actual security metrics and with an information theoretic approach, showing that gate level countermeasures such as WDDL can be successfully attacked exploiting static power instead of dynamic power.
机译:在这项工作中,研究了PRESENT-80分组密码在40nm CMOS技术中的实现方式,以及它在利用静态电源进行侧信道攻击方面的脆弱性。在过去的二十年中,已经提出了几种利用动态功耗来阻止DPA / CPA攻击的对策。特别是,WDDL逻辑样式是利用动态Power进行Power Analysis攻击的门级对策。已经证明,在深亚微米技术中,静态功耗不再像过去那样微不足道,恶意攻击者可以从静态功耗对处理后数据的可靠性中受益:泄漏功率分析(LPA)具有建议恢复敏感信息。从利用静态功率的受保护安全实现中恢复密钥的可能性不是小威胁,并且我们通过实际的安全指标和信息理论方法分析了此漏洞,表明可以成功利用WDDL等门级对策进行攻击。静态功率而不是动态功率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号