首页> 外文会议>IEEE International Conference on Application-Specific Systems, Architectures and Processors >Towards secure cryptographic software implementation against side-channel power analysis attacks
【24h】

Towards secure cryptographic software implementation against side-channel power analysis attacks

机译:致力于安全加密软件的实施,以抵抗侧信道功率分析攻击

获取原文

摘要

Side-channel attacks have been a real threat against many embedded cryptographic systems. A commonly used algorithmic countermeasure, random masking, incurs large execution delay and resource overhead. The other countermeasure, operation shuffling or permutation, can mitigate side-channel leakage effectively with minimal overhead. In this paper, we target automatically implementing operation shuffling in cryptographic algorithms to resist against side-channel power analysis attacks. We design a tool to detect independence among statements at the source code level and devise an algorithm for automatic operation shuffling. We test our algorithm on the new SHA3 standard, Keccak. Results show that the tool effectively implements operation-shuffling to reduce the side-channel leakage significantly, and therefore can guide automatic secure cryptographic software implementations against differential power analysis attacks.
机译:旁通道攻击已成为对许多嵌入式密码系统的真正威胁。常用的算法对策是随机屏蔽,会导致较大的执行延迟和资源开销。另一个对策是操作改组或置换,可以以最小的开销有效地缓解侧信道泄漏。在本文中,我们的目标是在密码算法中自动实现操作改组,以抵抗边信道功率分析攻击。我们设计了一种工具来检测源代码级别的语句之间的独立性,并设计了一种用于自动操作改组的算法。我们在新的SHA3标准Keccak上测试了我们的算法。结果表明,该工具有效地实施了改组操作,以显着减少侧信道泄漏,因此可以指导自动安全加密软件实施以抵抗差分功率分析攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号