首页> 外文会议>International Conference on Computing and Communications Technologies >A SCA-resistant processor architecture based on random delay insertion
【24h】

A SCA-resistant processor architecture based on random delay insertion

机译:基于随机延迟插入的抗SCA处理器架构

获取原文

摘要

Random delay insertion is a simple and efficient approach to counter side-channel attacks, but previous methods do not have the ideal protective effect. In this article, based on random delay insertion, an effective processor architecture resistant to side-channel attacks was proposed. It used a combination of randomized scheduling, randomized instruction insertion and randomized pipeline-delay to resist side-channel attacks. On the base of ARM7 processor, we implemented this architecture and the implementation results showed that this processor has increased approximate 24.3% in hardware area than the original ARM7 processor. The CPA attack experiment results suggested that our new secure processor have high capacity to resist side-channel attacks and thus could be used in USBKEY, Smart CARD and other application scenarios which require extremely high security level.
机译:随机延迟插入是一种简单有效的方法,可以抵抗侧信道攻击,但是以前的方法没有理想的保护作用。在本文中,基于随机延迟插入,提出了一种有效的抵抗侧信道攻击的处理器体系结构。它结合了随机调度,随机指令插入和随机流水线延迟来抵抗边信道攻击。在ARM7处理器的基础上,我们实现了此体系结构,并且实现结果表明,该处理器的硬件面积比原始ARM7处理器增加了约24.3%。 CPA攻击实验结果表明,我们的新型安全处理器具有强大的抵抗侧信道攻击的能力,因此可以用于USBKEY,Smart CARD和其他要求极高安全级别的应用场景。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号