Challenges in Feasible Simulation of Side-Channel Attack Resistance for Cryptographic Hardware

被引:0
|
作者
Iokibe, Kengo [1 ]
Himuro, Masaki [1 ]
Toyota, Yoshitaka [1 ]
机构
[1] Okayama Univ, Grad Sch Environm Life Nat Sci & Technol, Okayama, Japan
关键词
Cryptographic hardware; side-channel attack; correlation power analysis; signal-to-noise ratio; Root of Trust; LEAKAGE SIMULATION;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cryptographic hardware plays a crucial role in establishing the Root of Trust to ensure information security in various applications, including IoT devices, autonomous driving systems, and digital ecosystems. Critical Security Parameters (CSPs) like cryptographic engines and keys must be securely stored within a hardware-protected cryptographic boundary to enhance security. This paper comprehensively reviews methods for evaluating resistance against Side-Channel Attacks (SCA). It introduces research that employs the signal-to-noise ratio of Side-Channel (SC) leakage. The objective is to facilitate an efficient evaluation of SCA resistance for the development of practical designs of cryptographic hardware.
引用
收藏
页码:49 / 52
页数:4
相关论文
共 50 条
  • [1] Side-channel attack countermeasure evaluation of cryptographic hardware implementation circuit
    Asai, Toshiya
    Asahi, Kensaku
    Shiozaki, Mitsuru
    Fujino, Takeshi
    Yoshikawa, Masaya
    IEEJ Transactions on Electronics, Information and Systems, 2014, 134 (12) : 1767 - 1774
  • [2] Irradiation Side-Channel Attack on Cryptographic Chip
    Qu, Ming
    Chang, Yuchun
    PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON INTEGRATED CIRCUITS AND MICROSYSTEMS (ICICM), 2016, : 41 - 45
  • [3] Side-Channel Attack on STTRAM based Cache for Cryptographic Application
    Khan, Mohammad Nasim Imtiaz
    Bhasin, Shivam
    Yuan, Alex
    Chattopadhyay, Anupam
    Ghosh, Swaroop
    2017 IEEE 35TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2017, : 33 - 40
  • [4] A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber
    Ji, Yanning
    Wang, Ruize
    Ngo, Kalle
    Dubrova, Elena
    Backlund, Linus
    2023 IEEE EUROPEAN TEST SYMPOSIUM, ETS, 2023,
  • [5] Side-Channel Attacks on Cryptographic Software
    Lawson, Nate
    IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68
  • [6] Efficient Simulation of EM Side-Channel Attack Resilience
    Kumar, Amit
    Scarborough, Cody
    Yilmaz, Ali
    Orshansky, Michael
    2017 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2017, : 123 - 130
  • [7] Deep learning side-channel attack against hardware implementations of AES
    Kubota, Takaya
    Yoshida, Kota
    Shiozaki, Mitsuru
    Fujino, Takeshi
    MICROPROCESSORS AND MICROSYSTEMS, 2021, 87
  • [8] A Side-Channel Attack on a Masked Hardware Implementation of CRYSTALS-Kyber
    Ji, Yanning
    Dubrova, Elena
    PROCEEDINGS OF THE 2023 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY, ASHES 2023, 2023, : 27 - 37
  • [9] Defeating Hardware Prefetchers in Flush plus Reload Side-Channel Attack
    Wang, Zihao
    Peng, Shuanghe
    Jiang, Wenbin
    Guo, Xinyue
    IEEE ACCESS, 2021, 9 : 21251 - 21257
  • [10] Hardware/Software Obfuscation against Timing Side-channel Attack on a GPU
    Karimi, Elmira
    Fei, Yunsi
    Kaeli, David
    PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2020, : 122 - 131