Filters








353 Hits in 5.9 sec

Optimal First-Order Boolean Masking for Embedded IoT Devices [chapter]

Alex Biryukov, Daniel Dinu, Yann Le Corre, Aleksei Udovenko
2018 Lecture Notes in Computer Science  
Then, we compare the efficiency of first-order masked implementations of three lightweight block ciphers on an ARM Cortex-M3 to determine which design strategies are most suitable for efficient masking  ...  All our masked implementations passed the t-test evaluation and thus are deemed secure against first-order side-channel attacks.  ...  The authors thank the anonymous reviewers for their valuable comments. The work of Aleksei Udovenko is supported by the Fonds National de la Recherche, Luxembourg (project reference 9037104).  ... 
doi:10.1007/978-3-319-75208-2_2 fatcat:fimqzo4inzbdfgz5bh6r22l3r4

Integrative Acceleration of First-order Boolean Masking for Embedded IoT Devices

Yuichi Komano, Hideo Shimizu, Hideyuki Miyake
2019 Journal of Information Processing  
., secure against the first-order side-channel attack, with the ISO/IEC17825 test.  ...  Physical attacks, especially side-channel attacks, are threats to IoT devices which are located everywhere in the field; and therefore, protecting such devices against side-channel attacks is one of our  ...  We would like to thank anonymous reviewers for their fruitful comments on the previous version of this manuscript. A part of this work is supported by JSPS KAKENHI Grant Number 18H05289.  ... 
doi:10.2197/ipsjjip.27.585 fatcat:ohuwn6uy4jhhfohfayvril2x44

Assessment of Addition-Chain-Based Masked S-Box Using Deep-Learning-Based Side-Channel Attacks

Huizhong Li, Jingdian Ming, Yongbin Zhou
2022 Security and Communication Networks  
In simulated experiments, we perform DL-SCAs on first-order masked implementations with different noise levels and training trace numbers.  ...  Masking schemes are considered to be effective countermeasures to protect Internet-of-Things devices from side-channel attacks.  ...  Considering d � 1 in the first-order Boolean masking, the MI results of AES S-Box and monomial functions are depicted in Figure 2 .  ... 
doi:10.1155/2022/7771621 doaj:5d612421201d4f8bb4d93eddda1bbcee fatcat:lofa5n2fdfhbtnexdz33xnefum

Lightweight Conversion from Arithmetic to Boolean Masking for Embedded IoT Processor

HanBit Kim, Seokhie Hong, HeeSeok Kim
2019 Applied Sciences  
Masking conversion algorithms can be classified into two categories: "Boolean to Arithmetic (B2A)" and "Arithmetic to Boolean (A2B)".  ...  First, we specifically show how to reduce the pre-computation table from ( k + 1 ) -bit to ( k ) -bit, as a result, the memory use for the pre-computation table is reduced from ( 2 ( k + 1 ) ) ( k + 1  ...  Therefore, optimization studies for the high-order masking of conversion algorithms should continue. ||r) mod 2 (n−2)·k = x − R − (r|| . . .  ... 
doi:10.3390/app9071438 fatcat:cioywcnjffcyfeclw4r6yx6o7e

An Efficient and Low-Power Design of the SM3 Hash Algorithm for IoT

Xin Zheng, Xianghong Hu, Jinglong Zhang, Jian Yang, Shuting Cai, Xiaoming Xiong
2019 Electronics  
Thus, the design accommodates the resource-limited IoT security devices very well. The proposed architecture is applied to an intelligent security gateway device.  ...  The Internet-of-Things (IoT) has a security problem that has become increasingly significant. New architecture of SM3 which can be implemented in loT devices is proposed in this paper.  ...  For example, the static or dynamic analysis of the firmware and the source code running on IoT devices is used to discover and cope with the potential vulnerabilities for IoT devices [5] .  ... 
doi:10.3390/electronics8091033 fatcat:eh6a273prba7zbztg6ftgzhapq

Can Ternary Computing Improve Information Assurance?

Bertrand Cambou, Paul Flikkema, James Palmer, Donald Telesca, Christopher Philabaum
2018 Cryptography  
We suggest that balanced ternary logic can be valuable to Internet of Things (IoT) security, authentication of connected vehicles, as well as hardware and software assurance, and have developed a ternary  ...  The mainstream technologies used to manufacture embedded microcontrollers for IoT networks can offer, at little cost, CMOS devices with multiple thresholds to design heterogeneous binary/ternary units.  ...  Often the constellation of IoTs does not have enough embedded security. Interaction with people and social engineering represent an additional set of opportunities for malicious parties.  ... 
doi:10.3390/cryptography2010006 fatcat:5pxyflzvsffglggmjvmk2kjovu

Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information

Kostas Papagiannopoulos
2018 Transactions on Cryptographic Hardware and Embedded Systems  
These countermeasures employ memory units to store generated random numbers and reuse them in subsequent computations,making them primarily suitable for implementation on devices with sufficient memory  ...  maximize the security level achieved for a certain cost.  ...  Acknowledgments I would like to thank Lejla Batina, Joan Daemen and Vincent Grosso for their feedback comments and the discussions towards SASCA.  ... 
doi:10.13154/tches.v2018.i3.524-546 dblp:journals/tches/Papagiannopoulos18 fatcat:ro3ypd2nfvfd7gcflbvlz3jtdy

Efficient Masking of ARX-Based Block Ciphers Using Carry-Save Addition on Boolean Shares [chapter]

Daniel Dinu, Johann Großschädl, Yann Le Corre
2017 Lecture Notes in Computer Science  
Applying masking to a cipher that involves both arithmetic and Boolean operations requires a conversion between arithmetic and Boolean masks.  ...  At FSE 2015, Coron et al. proposed a logarithmic-time algorithm for modular addition on Boolean shares based on the Kogge-Stone carry-lookahead adder.  ...  Goubin was the first to describe secure algorithms for conversion between arithmetic and Boolean masks in [9] .  ... 
doi:10.1007/978-3-319-69659-1_3 fatcat:uweahyajcjhdlmy2daiewhacs4

A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications [article]

Xuefei Yin, Song Wang, Yanming Zhu, Jiankun Hu
2022 arXiv   pre-print
To the best of our knowledge, the proposed method is the first length-flexible lightweight, high-performing cancelable fingerprint template design for resource-constrained IoT applications.  ...  However, to suit resource-constrained IoT devices, oversimplified templates would compromise authentication performance significantly.  ...  For the cell validity part, we use the OR Boolean operator to concatenate four neighboring cell masks so that valid cells can remain.  ... 
arXiv:2206.12864v1 fatcat:qnw3jfyoivem5imm6hzuxwkffm

Systematic Approach for State-of-the-Art Architectures and System-on-chip Selection for Heterogeneous IoT Applications

Ramesh Krishnamoorthy, Kalimuthu Krishnan, Bharatiraja Chokkalingam, Sanjeevikumar Padmanaban, Zbigniew Leonowicz, Jens Bo Holm-Nielsen, Massimo Mitolo
2021 IEEE Access  
To select specific system-on-chip (SoC) architecture for heterogeneous IoT applications, a genetic algorithm (GA) based optimization method is implemented in MATLAB.  ...  This article helps the researchers and field engineers to comprehend the microarchitecture device configurations and to identify the superior SoC for next-generation IoT practices.  ...  Table 13 illustrates the confusion matrix table in which the devices assign with Boolean representation. For highend devices, the Boolean value allocated as 1, and for basic devices, the value is 0.  ... 
doi:10.1109/access.2021.3055650 fatcat:n5yo3savcjdyxdolpwrlc5dza4

A Configurable RO-PUF for Securing Embedded Systems Implemented on Programmable Devices

Macarena C. Martínez-Rodríguez, Eros Camacho-Ruiz, Piedad Brox, Santiago Sánchez-Solano
2021 Electronics  
RO-PUF implementation on programmable logic devices is conceived to minimize the use of available resources, while operating speed can be optimized by properly selecting the size of the elements used to  ...  The work also describes the interface added to the PUF to facilitate its incorporation as hardware Intellectual Property (IP)-modules into embedded systems.  ...  embedded system applications, such as IoT.  ... 
doi:10.3390/electronics10161957 fatcat:wl5pvs6yovhw5o24kxpnrypnai

Mind the Gap: Towards Secure 1st-Order Masking in Software [chapter]

Kostas Papagiannopoulos, Nikita Veshchikov
2017 Lecture Notes in Computer Science  
Last, we craft the first (to our knowledge) "hardened" 1st-order ISW-based, masked Sbox implementation, which is capable of resisting 1st-order, univariate side-channel attacks.  ...  First, we perform an in-depth investigation of the device-specific effects that invalidate ILA in the AVR microcontroller ATMega163.  ...  Background Boolean Masking & Order Reduction Chari et al., Goubin et al. and Messerges [9, 15, 21] were among the first to suggest splitting intermediate values with a secret sharing scheme, in order  ... 
doi:10.1007/978-3-319-64647-3_17 fatcat:2ylhgsvbxbcnjnczhafnmxilmm

Correlation Differential Power Analysis Attack to Midori64 [article]

Behrooz Khadem, Hamid Ghanbari, Amin Masoumi souteh
2021 arXiv   pre-print
Today, Internet communication security has become more complex as technology becomes faster and more efficient, especially for resource-limited devices such as embedded devices, wireless sensors, and radio  ...  Lightweight encryption algorithms provide security for these devices to protect data against intruders.  ...  Mahdavi for their kind contributions during this paper.  ... 
arXiv:2108.11115v1 fatcat:7bsha7noszesveqkywxuxoitym

Assertive, Selective, Scalable IoT-Based Warning System

Ion-Dorinel Filip, Cristian-Mihai Iliescu, Florin Pop
2022 Sensors  
and ideas for further developments.  ...  They are built to support a multitude of data from an IoT system and scale very well with the system.  ...  Acknowledgments: We would like to thank the reviewers for their time and expertise, constructive comments and valuable insight. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s22031015 pmid:35161759 pmcid:PMC8840114 fatcat:ae2qkv5bfjhrdkpl5mdcc4km6m

A Memory Hierarchy Protected against Side-Channel Attacks

Ezinam Bertrand Talaki, Olivier Savry, Mathieu Bouvier Des Noes, David Hely
2022 Cryptography  
Many first-order side-channel attacks have been reported on all its components from the main memory to the CPU registers.  ...  Only 8-bit Initialization Vectors are stored for each mask value to enable further recomputation of the masks.  ...  In the rest of this paper, when referring to masking, we imply first order boolean masking for hardware modules.  ... 
doi:10.3390/cryptography6020019 fatcat:asl6bft22ndclmt2u44vajfkle
« Previous Showing results 1 — 15 out of 353 results