292 Hits in 9.3 sec

Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks [chapter]

Maxime Nassar, Sylvain Guilley, Jean-Luc Danger
2011 Lecture Notes in Computer Science  
Several types of countermeasures against side-channel attacks are known.  ...  Keywords: side-channel attacks (SCAs), masking countermeasure, non-injective leakage function, correlation power analysis (CPA), second-order CPA (2O-CPA), mutual information analysis (MIA), entropy vs  ...  Acknowledgments The authors thank Manuel San Pedro for insightful discussions about SATsolvers, and Sébastien Briais for ideas about the constructions of indicator functions.  ... 
doi:10.1007/978-3-642-25578-6_4 fatcat:swr5y7izmfbvtlh6knjjc66x6i

A Provably Secure and Efficient Countermeasure against Timing Attacks

Boris Köpf, Markus Dürmuth
2009 2009 22nd IEEE Computer Security Foundations Symposium  
We use this bound to derive a novel countermeasure against timing attacks, where the strength of the security guarantee can be freely traded for the resulting performance penalty.  ...  We give algorithms that efficiently and optimally adjust this trade-off for given constraints on the side-channel leakage or on the efficiency of the cryptosystem.  ...  We leave the investigation of min-entropic bounds for the side-channel leakage in unknown-message attacks to future work. IV. AN ADJUSTABLE COUNTERMEASURE AGAINST TIMING ATTACKS A.  ... 
doi:10.1109/csf.2009.21 dblp:conf/csfw/KopfD09 fatcat:khv3245vtbezjhfow7r6ifhmri

Hardware Security (Dagstuhl Seminar 16202)

Osnat Keren, Ilia Polian, Mark M. Tehranipoor, Marc Herbstritt
2016 Dagstuhl Reports  
This seminar aims to bring together a group of researchers, who are actively involved in the design and the security assessment of hardware primitives.  ...  The seminar was indeed successful in familiarizing the researchers with recent developments in hardware security field of study, providing better understanding of still unsolved problems, and pointing  ...  Side-Channel Security through Dynamic Reconfiguration: a Trade-off between Granularity and Side-Channel Resistance?  ... 
doi:10.4230/dagrep.6.5.72 dblp:journals/dagstuhl-reports/KerenPT16 fatcat:dj5xqpsogrgtlgut3oneo6qss4

Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA [article]

Johann Knechtel, Elif Bilge Kavun, Francesco Regazzoni, Annelie Heuser, Anupam Chattopadhyay, Debdeep Mukhopadhyay, Soumyajit Dey, Yunsi Fei, Yaacov Belenky, Itamar Levi, Tim Güneysu, Patrick Schaumont, Ilia Polian
2020 arXiv   pre-print
In this paper, we first introduce hardware security for the EDA community. Next we review prior (academic) art for EDA-driven security evaluation and implementation of countermeasures.  ...  the system level down to the "bare metal"; modeling, evaluation, and consideration of security-relevant metrics; or automated and holistic synthesis of various countermeasures, without inducing negative  ...  III in more detail. 1) Side-Channel Attacks (SCAs): SCAs exploit information leakage from measurable physical channels and sensitivities of (i) the circuitry itself or (ii) the architecture.  ... 
arXiv:2001.09672v1 fatcat:72lodqrfhfeanfnatkzkjuoc2i

Rational Protection against Timing Attacks

Goran Doychev, Boris Kopf
2015 2015 IEEE 28th Computer Security Foundations Symposium  
One is hence faced with the problem of striking a balance between performance and security against timing attacks.  ...  In this paper, we propose a systematic approach for determining the optimal protection against timing attacks, on the example of cryptosystems based on discrete logarithms.  ...  [5] also reason about trade-offs between security and performance in side-channel attacks, where they focus on the decision between the masking countermeasure and a leakageresilient primitive.  ... 
doi:10.1109/csf.2015.39 dblp:conf/csfw/DoychevK15 fatcat:g2wnnmpqtzhwjnojyjoz6wngbu

Cost-Effective Design Strategies for Securing Embedded Processors

Florent Bruguier, Pascal Benoit, Lionel Torres, Lyonel Barthe, Morgan Bourree, Victor Lomne
2016 IEEE Transactions on Emerging Topics in Computing  
Side-Channel Attacks (SCAs) such as Differential Power or ElectroMagnetic Analysis (DPA/DEMA), pose a serious threat to the security of embedded systems.  ...  Through an FPGA-based processor, we then evaluate the overhead and the effectiveness of the proposed solutions against time-domain first-order attacks.  ...  of 35% (i.e. a weak randomisation in the context of side-channel analysis).  ... 
doi:10.1109/tetc.2015.2407832 fatcat:yx5hxwbcyvck7fqptvpveehbn4

Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices [chapter]

Marcel Medwed, François-Xavier Standaert, Johann Großschädl, Francesco Regazzoni
2010 Lecture Notes in Computer Science  
In addition, we estimate the cost of our scheme in terms of area and execution time for various security/performance trade-offs.  ...  We evaluate the resistance of our scheme against fault and side-channel analysis, and introduce a simple architecture for VLSI implementation on RFID tags.  ...  This work is funded in part by the European Commission's ECRYPT NoE phase II project, by the Belgian State IAP program P6/26 BCRYPT, by the Walloon region E.USER project and by the Austrian Government  ... 
doi:10.1007/978-3-642-12678-9_17 fatcat:ch6ds4mhkjevvmip7dqmfghfem

Side-Channel Analysis of Keymill [chapter]

Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel
2017 Lecture Notes in Computer Science  
One prominent countermeasure against side-channel attacks, especially differential power analysis (DPA), is fresh re-keying.  ...  To ensure the security of the scheme against side-channel analysis, the re-keying function has to withstand both simple power analysis (SPA) and differential power analysis (DPA).  ...  This work has been supported in part by the Austrian Science Fund (project P26494-N15) and by the Austrian Research Promotion Agency (FFG) under grant number 845589 (SCALAS).  ... 
doi:10.1007/978-3-319-64647-3_9 fatcat:fvnzwvifgrawjomzybeh75kro4

SCA-secure ECC in software - mission impossible? [article]

Lejla Batina, Lukasz Chmielewski, Björn Haase, Niels Samwel, Peter Schwabe
2021 IACR Cryptology ePrint Archive  
This software comes with extensive mitigations against various side-channel and fault attacks and is, to our best knowledge, the first to claim affordable protection against multiple classes of attacks  ...  We also present results of a comprehensive side-channel evaluation.  ...  Hence, this work does not offer a comprehensive evaluation but rather a solid benchmark in evaluating trade-offs for certain classes of side-channel attacks (SPA and DPA).  ... 
dblp:journals/iacr/BatinaCHSS21 fatcat:cjgvyu4mjjegflz32afpgykwfm

A Memory Hierarchy Protected against Side-Channel Attacks

Ezinam Bertrand Talaki, Olivier Savry, Mathieu Bouvier Des Noes, David Hely
2022 Cryptography  
Many first-order side-channel attacks have been reported on all its components from the main memory to the CPU registers.  ...  The overall security of the masking scheme is assessed through a mutual information estimation that helped evaluate the minimum number of attack traces needed to succeed a profiling side-channel attack  ...  their content protected against first-order side-channel attacks.  ... 
doi:10.3390/cryptography6020019 fatcat:asl6bft22ndclmt2u44vajfkle

IPM-RED: combining higher-order masking with robust error detection

Osnat Keren, Ilia Polian
2020 Journal of Cryptographic Engineering  
In this paper, we introduce a technique that provides very high security against both types of attacks.  ...  We prove that our scheme has the same security against side-channel attacks that an earlier, non-robust IPM-based solution has and in addition preserves robustness during addition and multiplication (and  ...  as you give appropriate credit to the original author(s) and the  ... 
doi:10.1007/s13389-020-00229-4 fatcat:23xhnbzsnzhlvdbq5g5lbbwzfi

SC-DDPL as a Countermeasure against Static Power Side-Channel Attacks

Davide Bellizia, Riccardo Della Sala, Giuseppe Scotti
2021 Cryptography  
In this work, we analyze the effectiveness of the Standard Cell Delay-based Precharge Logic (SC-DDPL) style in counteracting static power side-channel attacks.  ...  CMOS implementation and other state-of-the-art countermeasures such as WDDL and MDPL.  ...  Impl Conclusions In this paper, we carry out and in-depth analysis of the effectiveness of the TELcompliant SC-DDPL logic style as a countermeasure against static power side-channel attacks.  ... 
doi:10.3390/cryptography5030016 fatcat:a4s63dvaybakthtk2u2e3jrm2e

Masking against Side-Channel Attacks: A Formal Security Proof [chapter]

Emmanuel Prouff, Matthieu Rivain
2013 Lecture Notes in Computer Science  
Masking is a well-known countermeasure to protect block cipher implementations against side-channel attacks.  ...  Our work can be viewed as an extension of the seminal work of Chari et al. published at CRYPTO in 1999 on the soundness of combining masking with noise to thwart side-channel attacks.  ...  Masking was soon identified as a sound countermeasure when side-channel attacks appeared in the literature [4, 19] .  ... 
doi:10.1007/978-3-642-38348-9_9 fatcat:tkypskwmyzesxfp62xpw2dtf2q

Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers

Florian Unterstein, Marc Schink, Thomas Schamberger, Lars Tebelmann, Manuel Ilg, Johann Heyszl
2020 Transactions on Cryptographic Hardware and Embedded Systems  
We show that the concept provides the side-channel hardening that is required for the long-term security of IoT devices.  ...  In this work, we demonstrate how unprotected hardware AES engines of COTS microcontrollers can be efficiently protected against side-channel attacks by constructing a leakage resilient pseudo random function  ...  Acknowledgments The work presented in this contribution was supported by the German Federal Ministry of Education and Research in the project ALESSIO through grant number 16KIS0629 and 16KIS0632.  ... 
doi:10.13154/tches.v2020.i4.365-388 dblp:journals/tches/UntersteinSSTIH20 fatcat:vly45rwqdzhrjagqernn7vhdva

Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd Randomizers [chapter]

Dina Kamel, Guerric de Streel, Santos Merino Del Pozo, Kashif Nawaz, François-Xavier Standaert, Denis Flandre, David Bol
2016 Lecture Notes in Computer Science  
standard side-channel attacks in case of low physical noise in the attacks' setups, hence enabling the use of mathematical countermeasures.  ...  With the exploding number of connected objects and sensitive applications, security against side-channel attacks becomes critical in low-cost and low-power IoT applications.  ...  This work has been funded in parts by the ARC Project NANOSEC. François-Xavier Standaert is a research associate of the Belgian Fund for Scientific Research.  ... 
doi:10.1007/978-3-319-49445-6_13 fatcat:chqdrc5y5vhd5fym4mashibil4
« Previous Showing results 1 — 15 out of 292 results