首页> 外文会议>International Conference on Reconfigurable Computing and FPGAs >Side-channel power analysis of different protection schemes against fault attacks on AES
【24h】

Side-channel power analysis of different protection schemes against fault attacks on AES

机译:针对AES故障攻击的不同保护方案的侧信道功率分析

获取原文

摘要

A protection circuit can be added into cryptographic systems to detect both soft errors and injected faults required by Differential Fault Analysis (DFA) attacks. While such protection can improve the reliability of the target devices significantly and counteract DFA, they will also incur extra power consumption and other resource overhead. In this paper, we analyze the side-channel power leakage of AES protection methods against fault attacks and quantify the amount. We implement six different schemes and launch correlation power analysis attacks on them. The results show that the protection circuits have all increased the power leakage and therefore make the system more vulnerable to power analysis attacks. We further compare different protection schemes in terms of power consumption, area, fault coverage, and side-channel leakage. Our results demonstrate trade-offs among multiple design metrics, and suggest that reliability, security, and costs have to be all considered together in the design phase of cryptographic systems.
机译:可以将保护电路添加到密码系统中,以检测软错误和差分故障分析(DFA)攻击所需的注入故障。尽管这种保护可以显着提高目标设备的可靠性并抵消DFA,但它们也会招致额外的功耗和其他资源开销。在本文中,我们分析了针对故障攻击的AES保护方法的侧信道功率泄漏,并对其数量进行了量化。我们实施了六种不同的方案,并对它们发起了相关功效分析攻击。结果表明,保护电路都增加了功率泄漏,因此使系统更容易受到功率分析攻击。我们在功耗,面积,故障覆盖范围和侧通道泄漏方面进一步比较了不同的保护方案。我们的结果证明了在多个设计指标之间的权衡,并建议在加密系统的设计阶段必须同时考虑可靠性,安全性和成本。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号