Side-channel attack countermeasure evaluation of cryptographic hardware implementation circuit

被引:0
|
作者
Asai, Toshiya [1 ,2 ]
Asahi, Kensaku [1 ,2 ]
Shiozaki, Mitsuru [2 ,3 ]
Fujino, Takeshi [2 ,3 ]
Yoshikawa, Masaya [1 ,2 ]
机构
[1] Meijo University, 1-501, Shiogamaguchi, Tenpaku-ku, Nagoya,468-8502, Japan
[2] JST, CREST, 5, Sanbancho, Chiyoda-ku, Tokyo,102-0075, Japan
[3] Ritsumeikan University, 1-1-1, Noji-Higashi, Kusatsu,525-8577, Japan
关键词
Timing circuits - LSI circuits;
D O I
10.1541/ieejeiss.134.1767
中图分类号
学科分类号
摘要
The encryption standard, which has been widely used, is computationally secured. It is reported that encryption standard becomes vulnerable against side-channel attacks (SCA) when it was incorporated in hardware. Therefore, various measures against SCA have been proposed. Evaluation and verification of vulnerability against SCA are the most important priority for the measures. This paper proposes a new method for efficient evaluation of SCA measures on design phase of LSI. The proposed method introduces event-modeling simulation and clustering technique in order to achieve highly efficient evaluation. Moreover, the proposed method can detect the vulnerable cells on designing phase of LSI. Experimental results using 018um CMOS standard cell library prove the validity of the proposed method. © 2014 The Institute of Electrical Engineers of Japan.
引用
收藏
页码:1767 / 1774
相关论文
共 50 条
  • [21] Security Evaluation of Cryptographic Modules against Side-Channel Attack using a Biased Data Set
    Matsubayashi, Masato
    Guntur, Hendra
    Satoh, Akashi
    2017 IEEE 6TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 2017,
  • [22] ASCON hardware implementations and side-channel evaluation
    Gross, Hannes
    Wenger, Erich
    Dobraunig, Christoph
    Ehrenhoefer, Christoph
    MICROPROCESSORS AND MICROSYSTEMS, 2017, 52 : 470 - 479
  • [23] Recent research trends in side channel attack on cryptographic modules and its countermeasure
    Graduate School of Engineering, Tohoku University, 6-3, Aramaki, Aza Aoba, Aoba, Sendai 980-8578, Japan
    不详
    不详
    IEEJ Trans. Fundam. Mater., 1 (9-12):
  • [24] Efficient Implementation of Masked AES on Side-Channel Attack Standard Evaluation Board
    Masoumi, Massoud
    Habibi, Pouya
    Jadidi, Mohammad
    INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2015), 2015, : 151 - 156
  • [25] A Hardware-Friendly Shuffling Countermeasure Against Side-Channel Attacks for Kyber
    Xu, Dejun
    Wang, Kai
    Tian, Jing
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2025, 72 (03) : 504 - 508
  • [26] Hardware countermeasure against side-channel attacks based on randomized instruction injection
    He, Zhangqing
    Ao, Tianyong
    Liu, Kai
    Dai, Kui
    He, Z. (ivan_hee@126.com), 1600, Huazhong University of Science and Technology (42): : 128 - 132
  • [27] A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack
    Kordi, Farshideh
    Hosseintalaee, Hamed
    Jahanian, Ali
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 14 (01): : 47 - 55
  • [28] Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature
    Fukushima, Kazuhide
    Okada, Hiroki
    Takarabt, Sofiane
    Korchi, Amina
    Hamoud, Meziane
    Karray, Khaled
    Souissy, Youssef
    Guilley, Sylvain
    SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 701 - 706
  • [29] Side-Channel Attacks on Cryptographic Software
    Lawson, Nate
    IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68
  • [30] Deep learning side-channel attack against hardware implementations of AES
    Kubota, Takaya
    Yoshida, Kota
    Shiozaki, Mitsuru
    Fujino, Takeshi
    MICROPROCESSORS AND MICROSYSTEMS, 2021, 87