首页> 外文会议>Signals, Circuits and Systems (SCS), 2009 >Evaluation of countermeasure implementations based on Boolean masking to thwart side-channel attacks
【24h】

Evaluation of countermeasure implementations based on Boolean masking to thwart side-channel attacks

机译:评估基于布尔屏蔽的对策实施以阻止边信道攻击

获取原文

摘要

This paper presents hardware implementations of a DES cryptoprocessor with masking countermeasures and their evaluation against side-channel attacks (SCAs) in FPGAs. The masking protection has been mainly studied from a theoretical viewpoint without any thorough test in a noisy real world designs. In this study the masking countermeasure is tested with first-order and higher-order SCAs on a fully-fledged DES. Beside a classical implementation of the DES substitution boxes (S-boxes) a simple structure called universal substitution boxes with masking (USM) is proposed. It meets the constraint of low complexity as state-of-the-art masked S-boxes are mostly built from large look-up tables or complex calculations with combinatorial logic gates. However attacks on USM has underlined some security weaknesses. ROM masked implementation exhibits greater robustness as it cannot be attacked with first-order DPA. Nevertheless any masking implementation remains sensitive to higher-order differential power analysis (HO-DPA) as shown in a proposed attack. This attack is based on a variance analysis of the observed power consumption and it clearly shows the vulnerabilities of masking countermeasures.
机译:本文介绍了具有屏蔽对策的DES密码处理器的硬件实现及其在FPGA中针对边信道攻击(SCA)的评估。屏蔽保护主要是从理论的角度进行研究,而在嘈杂的现实世界设计中没有进行任何彻底的测试。在这项研究中,在成熟的DES上使用一阶和更高阶SC​​A测试了掩蔽对策。除了DES替换框(S-box)的经典实现之外,还提出了一种简单的结构,称为带有掩码的通用替换框(USM)。它满足了低复杂度的限制,因为最先进的蒙版S盒主要是通过大型查找表或具有组合逻辑门的复杂计算来构建的。但是,对USM的攻击突显了一些安全漏洞。 ROM掩码实现具有更高的鲁棒性,因为它不能被一阶DPA攻击。然而,如提议的攻击所示,任何掩蔽实现都对高阶差分功率分析(HO-DPA)敏感。这种攻击是基于观察到的功耗的方差分析,它清楚地表明了掩盖对策的脆弱性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号