...
首页> 外文期刊>Emerging Topics in Computing, IEEE Transactions on >Timing Attack and Countermeasure on NEMS Relay Based Design of Block Ciphers
【24h】

Timing Attack and Countermeasure on NEMS Relay Based Design of Block Ciphers

机译:基于NEMS中继的分组密码系统的定时攻击与对策

获取原文
获取原文并翻译 | 示例
           

摘要

Scaling down CMOS technology results in excessive power dissipation issues. Nanoelectromechanical System (NEMS) relay technology is an alternative emerging solution that overcomes the power dissipation limitation of CMOS technology. However, despite its zero static leakage, NEMS relay technology suffers from large delay compared to CMOS technology. Binary Decision Diagram (BDD) based implementations of NEMS relay design targets minimizing the total delay. However, this implementation renders the timing delay of the output of a BDD input-dependent, which is a threat to security-critical applications, such as ciphers. In this paper, we analyze the impact of the input-dependent timing variation on the security of NEMS relay based cipher implementations. We present a generalized timing attack methodology, which is applicable to both Substitution Permutation Network (SPN) as well as Feistel block ciphers. We provide case studies on state-of-the-art SPN cipher candidate Advanced Encryption Standard (AES) and Feistel cipher candidates Camellia and DES. Our attack analysis shows that compact designs with single S-box implementation can be compromised, while parallel S-box implementations possess an inherent resistance against timing attacks. We also propose a cost-effective countermeasure which eliminates the input-dependent timing variation and thwarts all such timing attacks on BDD based implementations of NEMS relay design.
机译:缩小CMOS技术会导致过多的功耗问题。纳米机电系统(NEMS)中继技术是一种新兴的替代解决方案,它克服了CMOS技术的功耗限制。然而,尽管其零静态泄漏,但与CMOS技术相比,NEMS中继技术仍存在较大的延迟。 NEMS中继设计目标的基于二进制决策图(BDD)的实现可将总延迟最小化。但是,这种实现方式使BDD输入的输出时序延迟取决于输入,这对诸如密码之类的对安全性要求很高的应用程序构成威胁。在本文中,我们分析了基于输入的时序变化对基于NEMS中继的密码实现的安全性的影响。我们提出了一种广义的定时攻击方法,该方法适用于替代置换网络(SPN)和Feistel分组密码。我们提供有关最新SPN密码候选者高级加密标准(AES)和Feistel密码候选者茶花和DES的案例研究。我们的攻击分析表明,采用单个S-box实现的紧凑型设计可能会受到损害,而并行S-box实现具有对定时攻击的固有抵抗力。我们还提出了一种经济有效的对策,它消除了取决于输入的时序变化,并阻止了对基于NEMS继电器设计的BDD实现的所有此类时序攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号