首页> 外文会议>2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC) >A first step towards automatic application of power analysis countermeasures
【24h】

A first step towards automatic application of power analysis countermeasures

机译:自动化应用功率分析对策的第一步

获取原文

摘要

In cryptography, side channel attacks, such as power analysis, attempt to uncover secret information from the physical implementation of cryptosystems rather than exploiting weaknesses in the cryptographic algorithms themselves. The design and implementation of physically secure cryptosystems is a challenge for both hardware and software designers. Measuring and evaluating the security of a system is manual and empirical, which is costly and time consuming; this work demonstrates that it is possible to automate these processes. We introduce a systematic methodology for automatic application of software countermeasures and demonstrate its effectiveness on an AES software implementation running on an 8-bit AVR microcontroller. The framework identifies the most vulnerable instructions of the implementation to power analysis attacks, and then transforms the software using a chosen countermeasure to protect the vulnerable instructions. Lastly, it evaluates the security of the system using an information-theoretic metric and a direct attack.
机译:在密码学中,诸如功率分析之类的副信道攻击试图从密码系统的物理实现中发现秘密信息,而不是利用密码算法本身的弱点。物理安全密码系统的设计和实现对于硬件和软件设计人员都是一个挑战。测量和评估系统的安全性是手动和经验性的,这既昂贵又费时;这项工作表明可以自动化这些过程。我们介绍了一种自动应用软件对策的系统方法,并论证了其在运行于8位AVR微控制器上的AES软件实现中的有效性。该框架会识别实施中最易受攻击的指令,以进行功耗分析攻击,然后使用选定的对策来转换软件,以保护易受攻击的指令。最后,它使用信息理论指标和直接攻击来评估系统的安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号