首页> 外文期刊>Dependable and Secure Computing, IEEE Transactions on >Hardware Architecture Implemented on FPGA for Protecting Cryptographic Keys against Side-Channel Attacks
【24h】

Hardware Architecture Implemented on FPGA for Protecting Cryptographic Keys against Side-Channel Attacks

机译:在FPGA上实现的硬件体系结构,用于保护加密密钥免受侧通道攻击

获取原文
获取原文并翻译 | 示例

摘要

This paper presents a new hardware architecture designed for protecting the key of cryptographic algorithms against attacks by side-channel analysis (SCA). Unlike previous approaches already published, the fortress of the proposed architecture is based on revealing a false key. Such a false key is obtained when the leakage information, related to either the power consumption or the electromagnetic radiation (EM) emitted by the hardware device, is analysed by means of a classical statistical method. In fact, the trace of power consumption (or the EM) does not reveal any significant sign of protection in its behaviour or shape. Experimental results were obtained by using a Virtex 5 FPGA, on which a 128-bit version of the standard AES encryption algorithm was implemented. The architecture could easily be extrapolated to an ASIC device based on standard cell libraries. The system is capable of concealing the real key when various attacks are performed on the AES algorithm, using two statistical methods which are based on correlation, the Welch's t-test and the difference of means.
机译:本文提出了一种新的硬件体系结构,该体系结构旨在保护加密算法的密钥免受旁通道分析(SCA)的攻击。与已经发布的以前的方法不同,所提出的体系结构的堡垒是基于揭示伪造的密钥。当通过经典统计方法分析与硬件设备发出的功耗或电磁辐射(EM)有关的泄漏信息时,就会获得这种错误密钥。实际上,功耗(或EM)的痕迹在其行为或形状上并未显示出任何明显的保护迹象。通过使用Virtex 5 FPGA获得了实验结果,在该FPGA上实现了128位版本的标准AES加密算法。该架构可以轻松地外推到基于标准单元库的ASIC设备。当使用两种基于相关性的统计方法(韦尔奇t检验和均值差)对AES算法执行各种攻击时,该系统能够隐藏真实密钥。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号