Secure implementation of cryptographic modules: Development of a standard evaluation environment for side channel attacks

被引:0
|
作者
Satoh, Akashi [1 ]
Katashita, Toshihiro [1 ]
Sakane, Hirofumi [1 ]
机构
[1] Research Center for Information Security, AIST, Akihabara Daibiru 1003, 1-18-13 Sotokanda, Chiyoda-ku 101-0021, Japan
来源
Synthesiology | 2010年 / 3卷 / 01期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
The use of cryptographic modules is rapidly expanding throughout the world. Because of this, it is necessary to standardize a security evaluation scheme and to establish a public evaluation and validation program for these modules. Side channel attacks, which extract secret information from the cryptographic module by analyzing power consumption and electromagnetic radiation, are attracting a lot of attention. Research activity on such attacks has intensified recently. However, it is difficult to compare evaluation schemes proposed by different researchers because of differences in the experimental platform or environment. This makes it difficult for other researchers to repeat and verify the results. Therefore, we have developed cryptographic hardware boards and analysis software to serve as a common, uniform evaluation platform for side channel attacks. We have distributed this platform to government, industry, and academic research labs throughout the world in order to facilitate the development of an international standard.
引用
收藏
页码:55 / 65
相关论文
共 50 条
  • [1] Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks
    Luo, Pei
    Zhang, Liwei
    Fei, Yunsi
    Ding, A. Adam
    PROCEEDINGS OF THE ASAP2015 2015 IEEE 26TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, 2015, : 144 - 148
  • [2] A Study on Evaluation Board Requirements for Assessing Vulnerability of Cryptographic Modules to Side-Channel Attacks
    Iokibe, Kengo
    Kan, Tomonobu
    Toyota, Yoshitaka
    2020 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY AND SIGNAL & POWER INTEGRITY VIRTUAL SYMPOSIUM(IEEE EMC+SIPI), 2020, : 528 - 531
  • [3] Development of Side-Channel Attack Standard Evaluation Environment
    Katashita, Toshihiro
    Satoh, Akashi
    Sugawara, Takeshi
    Homma, Naofumi
    Aoki, Takafumi
    2009 EUROPEAN CONFERENCE ON CIRCUIT THEORY AND DESIGN, VOLS 1 AND 2, 2009, : 403 - +
  • [4] Side-Channel Attacks on Cryptographic Software
    Lawson, Nate
    IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68
  • [5] Design and Implementation of a Reconfigurable Cryptographic Coprocessor with Multiple Side-Channel Attacks Countermeasures
    Shang, Xinchao
    Shan, Weiwei
    Liu, Xinning
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2018, 27 (11)
  • [6] Compiler-Based Techniques to Secure Cryptographic Embedded Software Against Side-Channel Attacks
    Agosta, Giovanni
    Barenghi, Alessandro
    Pelosi, Gerardo
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (08) : 1550 - 1554
  • [7] Side-channel attack countermeasure evaluation of cryptographic hardware implementation circuit
    Asai, Toshiya
    Asahi, Kensaku
    Shiozaki, Mitsuru
    Fujino, Takeshi
    Yoshikawa, Masaya
    IEEJ Transactions on Electronics, Information and Systems, 2014, 134 (12) : 1767 - 1774
  • [8] Countermeasure for cryptographic chips to resist side-channel attacks
    Zhang, Tao
    Fan, Ming-Yu
    Ruan Jian Xue Bao/Journal of Software, 2008, 19 (11): : 2990 - 2998
  • [9] Side Channel Attacks Simulation Environment Design and Implementation for Crypto-Chip
    Ma, Shigui
    Yang, Chaoqiong
    Yao, Jianbo
    Xu, Zhuyu
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, INFORMATION AND MECHANICAL ENGINEERING (EMIM 2017), 2017, 76 : 715 - 719
  • [10] Side Channel Analysis and Evaluation on Cryptographic Products
    Chen H.
    Xi W.
    Fan L.
    Jiao Z.
    Feng J.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2020, 42 (08): : 1836 - 1845