Challenges in Feasible Simulation of Side-Channel Attack Resistance for Cryptographic Hardware

被引:0
|
作者
Iokibe, Kengo [1 ]
Himuro, Masaki [1 ]
Toyota, Yoshitaka [1 ]
机构
[1] Okayama Univ, Grad Sch Environm Life Nat Sci & Technol, Okayama, Japan
关键词
Cryptographic hardware; side-channel attack; correlation power analysis; signal-to-noise ratio; Root of Trust; LEAKAGE SIMULATION;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cryptographic hardware plays a crucial role in establishing the Root of Trust to ensure information security in various applications, including IoT devices, autonomous driving systems, and digital ecosystems. Critical Security Parameters (CSPs) like cryptographic engines and keys must be securely stored within a hardware-protected cryptographic boundary to enhance security. This paper comprehensively reviews methods for evaluating resistance against Side-Channel Attacks (SCA). It introduces research that employs the signal-to-noise ratio of Side-Channel (SC) leakage. The objective is to facilitate an efficient evaluation of SCA resistance for the development of practical designs of cryptographic hardware.
引用
收藏
页码:49 / 52
页数:4
相关论文
共 50 条
  • [31] Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES
    Brisfors, Martin
    Moraitis, Michail
    Dubrova, Elena
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2022, 2023, 13877 : 38 - 53
  • [32] Hardware Trojan attacks on voltage scaling-based side-channel attack countermeasure
    Yu, Weize
    IET CIRCUITS DEVICES & SYSTEMS, 2019, 13 (03) : 321 - 326
  • [33] Active Learning for Detecting Hardware Sensors-Based Side-Channel Attack on Smartphone
    Abbas, Sidra
    Alsubai, Shtwai
    Ojo, Stephen
    Sampedro, Gabriel Avelino
    Almadhor, Ahmad
    Al Hejaili, Abdullah
    Bouazzi, Imen
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2025, 50 (02) : 877 - 889
  • [34] Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation
    Kasper, Timo
    Oswald, David
    Paar, Christof
    RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 61 - 77
  • [35] Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation
    Kasper, Timo
    Oswald, David
    Paar, Christof
    RFID SECURITY AND PRIVACY, 2012, 7055 : 61 - 77
  • [36] Countermeasure for cryptographic chips to resist side-channel attacks
    Zhang, Tao
    Fan, Ming-Yu
    Ruan Jian Xue Bao/Journal of Software, 2008, 19 (11): : 2990 - 2998
  • [37] Protecting cryptographic integrated circuits with side-channel information
    Nagata, Makoto
    Fujimoto, Daisuke
    Miura, Noriyuki
    Homma, Naofumi
    Hayashi, Yu-ichi
    Sakiyama, Kazuo
    IEICE ELECTRONICS EXPRESS, 2017, 14 (02): : 1 - 13
  • [38] A Resource-Efficient and Side-Channel Secure Hardware Implementation of Ring-LWE Cryptographic Processor
    Liu, Dongsheng
    Zhang, Cong
    Lin, Hui
    Chen, Yuyang
    Zhang, Mingyu
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2019, 66 (04) : 1474 - 1483
  • [39] Side-Channel Protected PIPO Implementation in Hardware
    Han, Jaeseung
    Kim, Yeon-Jae
    Han, Dong-Guk
    2024 SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2024, 2024,
  • [40] The First Thorough Side-Channel Hardware Trojan
    Ender, Maik
    Ghandali, Samaneh
    Moradi, Amir
    Paar, Christof
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 : 755 - 780