...
首页> 外文期刊>Journal of circuits, systems and computers >Combinational Counters: A Low Overhead Approach to Address DPA Attacks
【24h】

Combinational Counters: A Low Overhead Approach to Address DPA Attacks

机译:组合计数器:一个低开销方法来解决DPA攻击

获取原文
获取原文并翻译 | 示例
           

摘要

Differential Power Analysis (DPA) attacks are known as viable and practical techniques to break the security of cryptographic algorithms. In this type of attack, an adversary extracts the encryption key based on the correlation of consumed power of the hardware running encryption algorithms to the processed data. To address DPA attacks in the hardware layer, various techniques have been proposed thus far. However, current techniques generally impose high performance overhead. Especially, the power overhead is a serious issue which may limit the applicability of current techniques in power-constrained applications. In this paper, combinational counters are explored as a way to address the DPA attacks. By randomizing the consumed power in each clock cycle of the circuit operation, these counters can enhance the resistance of the cryptographic cores against DPA attacks with low power overhead as well as zero timing overhead. Experimental results for an AES S-Box module in 45nm technology reveal that the proposed technique is capable of achieving higher level of security in comparison to two other approaches while preserving the power and performance overhead at a same or lower level.
机译:差分功率分析(DPA)攻击被称为可行和实用的技术,以打破加密算法的安全性。在这种类型的攻击中,对手基于对处理数据的硬件运行加密算法的消耗电力的相关性提取加密密钥。为了解决硬件层中的DPA攻击,迄今为止已经提出了各种技术。然而,电流技术通常施加高性能开销。特别是,电力开销是一个严重的问题,可能限制电流技术在功率受限应用中的适用性。在本文中,探索组合计数器作为解决DPA攻击的一种方式。通过随机化电路操作的每个时钟周期中的消耗功率,这些计数器可以通过低功率开销的DPA攻击来增强加密核的电阻以及零时开销。 45NM技术中AES S箱模块的实验结果表明,该技术能够与另外两种方法相比,实现更高的安全性较高的安全性,同时在相同或更低的级别处保持电力和性能开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号