首页> 外文会议>International Conference on Signals, Circuits and Systems >Evaluation of Countermeasure Implementations Based on Boolean Masking to Thwart Side-Channel Attacks
【24h】

Evaluation of Countermeasure Implementations Based on Boolean Masking to Thwart Side-Channel Attacks

机译:基于布尔屏蔽的对策实现评估横向渠道攻击

获取原文

摘要

This paper presents hardware implementations of a DES cryptoprocessor with masking countermeasures and their evaluation against side-channel attacks (SCAs) in FPGAs. The masking protection has been mainly studied from a theoretical viewpoint without any thorough test in a noisy real world designs. In this study the masking countermeasure is tested with first-order and higher-order SCAs on a fully-fledged DES. Beside a classical implementation of the DES substitution boxes (S-Boxes) a simple structure called Universal Substitution boxes with Masking (USM) is proposed. It meets the constraint of low complexity as state-of-the-art masked S-Boxes are mostly built from large look-up tables or complex calculations with combinatorial logic gates. However attacks on USM has underlined some security weaknesses. ROM masked implementation exhibits greater robustness as it cannot be attacked with first-order DPA. Nevertheless any masking implementation remains sensitive to Higher-Order Differential Power Analysis (HO-DPA) as shown in a proposed attack. This attack is based on a variance analysis of the observed power consumption and it clearly shows the vulnerabilities of masking countermeasures.
机译:本文介绍了DES CryptoCencessor的硬件实现,具有掩蔽对策及其对FPGA中的侧通道攻击(SCAS)的评估。掩蔽保护主要是从理论观点研究的,没有任何彻底测试的嘈杂的现实世界设计。在这项研究中,在完全成熟的DES上用一阶和高阶SCA测试掩蔽对策。除了DES替换框的经典实现旁边,提出了一种称为具有屏蔽(USM)的通用替换盒的简单结构。它符合低复杂性的约束,因为最先进的屏蔽S盒主要由大型查找表或使用组合逻辑门的复杂计算构成。然而,对USM的攻击强调了一些安全弱点。 ROM屏蔽的实现表现出更大的稳健性,因为它不能用一阶DPA攻击。然而,任何掩蔽实现对高阶差分功率分析(HO-DPA)仍然敏感,如提出的攻击所示。这种攻击基于观察到的功耗的方差分析,它清楚地显示了掩蔽对策的脆弱性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号