Challenges in Feasible Simulation of Side-Channel Attack Resistance for Cryptographic Hardware

被引:0
|
作者
Iokibe, Kengo [1 ]
Himuro, Masaki [1 ]
Toyota, Yoshitaka [1 ]
机构
[1] Okayama Univ, Grad Sch Environm Life Nat Sci & Technol, Okayama, Japan
关键词
Cryptographic hardware; side-channel attack; correlation power analysis; signal-to-noise ratio; Root of Trust; LEAKAGE SIMULATION;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cryptographic hardware plays a crucial role in establishing the Root of Trust to ensure information security in various applications, including IoT devices, autonomous driving systems, and digital ecosystems. Critical Security Parameters (CSPs) like cryptographic engines and keys must be securely stored within a hardware-protected cryptographic boundary to enhance security. This paper comprehensively reviews methods for evaluating resistance against Side-Channel Attacks (SCA). It introduces research that employs the signal-to-noise ratio of Side-Channel (SC) leakage. The objective is to facilitate an efficient evaluation of SCA resistance for the development of practical designs of cryptographic hardware.
引用
收藏
页码:49 / 52
页数:4
相关论文
共 50 条
  • [21] Hardware Trojan Design and Its Detection using Side-Channel Analysis on Cryptographic Hardware AES Implemented on FPGA
    Hanindhito, Bagus
    Kurniawan, Yusuf
    PROCEEDING OF 2019 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICEEI), 2019, : 191 - 196
  • [22] Deep Learning Multi-Channel Fusion Attack Against Side-Channel Protected Hardware
    Hettwee, Benjamin
    Fennes, Daniel
    Leger, Sebastien
    Richter-Brockmann, Jan
    Gehrer, Stefan
    Gueneysu, Tim
    PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2020,
  • [23] Chosen-Input Side-Channel Analysis on Unrolled Light-Weight Cryptographic Hardware
    Yli-Mayry, Ville
    Homma, Naofumi
    Aoki, Takafumi
    PROCEEDINGS OF THE EIGHTEENTH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED), 2017, : 301 - 306
  • [24] Side-channel attack on substitution blocks
    Novak, R
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 307 - 318
  • [25] SIDE-CHANNEL ATTACK ON THE HUMANAUTH CAPTCHA
    Javier Hernandez-Castro, Carlos
    Ribagorda, Arturo
    Saez, Yago
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 59 - 65
  • [26] Hiding Higher-Order Side-Channel Leakage Randomizing Cryptographic Implementations in Reconfigurable Hardware
    Sasdrich, Pascal
    Moradi, Amir
    Gueneysu, Tim
    TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 131 - 146
  • [27] USB side-channel attack on Tor
    Yang, Qing
    Gasti, Paolo
    Balagani, Kiran
    Li, Yantao
    Zhou, Gang
    COMPUTER NETWORKS, 2018, 141 : 57 - 66
  • [28] FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
    Bilgin, Begul
    Bogdanov, Andrey
    Knezevic, Miroslav
    Mendel, Florian
    Wang, Qingju
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2013, 2013, 8086 : 142 - 158
  • [29] Security Evaluation of Cryptographic Modules against Side-Channel Attack using a Biased Data Set
    Matsubayashi, Masato
    Guntur, Hendra
    Satoh, Akashi
    2017 IEEE 6TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 2017,
  • [30] Effects of embedded decompression and compaction architectures on side-channel attack resistance
    Liu, Chunsheng
    Huang, Yu
    25TH IEEE VLSI TEST SYMPOSIUM, PROCEEDINGS, 2007, : 461 - +