首页> 外文OA文献 >A new countermeasure against side-channel attacks based on hardware-software co-design
【2h】

A new countermeasure against side-channel attacks based on hardware-software co-design

机译:基于硬件 - 软件协同设计的侧信道攻击新对策

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whose implementation is based on a hardware-software co-design. The hardware architecture consists of a microprocessor, which executes the algorithm using a false key, and a coprocessor that performs several operations that are necessary to retrieve the original text that was encrypted with the real key. The coprocessor hardly affects the power consumption of the device, so that any classical attack based on such power consumption would reveal a false key. Additionally, as the operations carried out by the coprocessor are performed in parallel with the microprocessor, the execution time devoted for encrypting a specific text is not affected by the proposed countermeasure. In order to verify the correctness of our proposal, the system was implemented on a Virtex 5 FPGA. Different SCA attacks were performed on several functions of AES algorithm. Experimental results show in all cases that the system is effectively protected by revealing a false encryption key.
机译:本文旨在提出一种针对侧信道分析(SCA)攻击的新对策,其实现是基于软硬件协同设计的。硬件体系结构由一个微处理器和一个协处理器组成,该微处理器使用一个假密钥执行该算法,该协处理器执行一些必要的操作,以检索使用真实密钥加密的原始文本。协处理器几乎不会影响设备的功耗,因此,任何基于此类功耗的经典攻击都将显示伪密钥。另外,由于由协处理器执行的操作与微处理器并行执行,因此用于对特定文本进行加密的执行时间不受提议的对策影响。为了验证我们建议的正确性,该系统在Virtex 5 FPGA上实现。对AES算法的几种功能执行了不同的SCA攻击。实验结果表明,在所有情况下,都可以通过显示错误的加密密钥来有效保护系统。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号