Secure implementation of cryptographic modules: Development of a standard evaluation environment for side channel attacks

被引:0
|
作者
Satoh, Akashi [1 ]
Katashita, Toshihiro [1 ]
Sakane, Hirofumi [1 ]
机构
[1] Research Center for Information Security, AIST, Akihabara Daibiru 1003, 1-18-13 Sotokanda, Chiyoda-ku 101-0021, Japan
来源
Synthesiology | 2010年 / 3卷 / 01期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
The use of cryptographic modules is rapidly expanding throughout the world. Because of this, it is necessary to standardize a security evaluation scheme and to establish a public evaluation and validation program for these modules. Side channel attacks, which extract secret information from the cryptographic module by analyzing power consumption and electromagnetic radiation, are attracting a lot of attention. Research activity on such attacks has intensified recently. However, it is difficult to compare evaluation schemes proposed by different researchers because of differences in the experimental platform or environment. This makes it difficult for other researchers to repeat and verify the results. Therefore, we have developed cryptographic hardware boards and analysis software to serve as a common, uniform evaluation platform for side channel attacks. We have distributed this platform to government, industry, and academic research labs throughout the world in order to facilitate the development of an international standard.
引用
收藏
页码:55 / 65
相关论文
共 50 条
  • [31] How secure is your cache against side-channel attacks?
    He, Zecheng
    Lee, Ruby B.
    50TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO), 2017, : 341 - 353
  • [32] Towards Secure Communications: Review of Side Channel Attacks and Countermeasures on ECC
    Tawalbeh, Lo'ai A.
    Somani, Turki F.
    Houssain, Hilal
    2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 87 - 91
  • [33] An efficient design of RSA, secure against some side channel attacks
    Wu, Shuhua
    Zhu, Yuefel
    Pu, Qiong
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 2528 - 2532
  • [34] A Secure D Flip-Flop against Side Channel Attacks
    Vaquie, Bruno
    Tiran, Sebastien
    Maurine, Philippe
    INTEGRATED CIRCUIT AND SYSTEM DESIGN: POWER AND TIMING MODELING, OPTIMIZATION, AND SIMULATION, 2011, 6951 : 331 - 340
  • [35] On-Board Decoupling of Cryptographic FPGA to Improve Tolerance to Side-Channel Attacks
    Iokibe, Kengo
    Amano, Tetsuo
    Toyota, Yoshitaka
    2011 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC), 2011, : 925 - 930
  • [36] Aiding side-channel attacks on cryptographic software with satisfiability-based analysis
    Potlapally, Nachiketh R.
    Raghunathan, Anand
    Ravi, Srivaths
    Jha, Niraj K.
    Lee, Ruby B.
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2007, 15 (04) : 465 - 470
  • [37] Satisfiability-based framework for enabling side-channel attacks on cryptographic software
    Potlapally, Nachiketh R.
    Raghunathan, Anand
    Ravi, Srivaths
    Jha, Niraj K.
    Lee, Ruby B.
    2006 DESIGN AUTOMATION AND TEST IN EUROPE, VOLS 1-3, PROCEEDINGS, 2006, : 1353 - +
  • [38] Asynchronous Cryptographic System: Side channel attacks through differential power analysis (DPA)
    Kim, Yeon-Ho
    Lee, Sang-Jin
    Kim, Kyu-Kwan
    You, Young-Gap
    Cho, Kyoung-Rok
    Cho, Tae-Won
    Eshraghian, Kamran
    WMSCI 2010: 14TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, 2010, : 39 - 42
  • [39] Cryptographic Coprocessor with Modular Architecture for Research and Development of Countermeasures Against Power-Based Side-Channel Attacks
    Korona, Mateusz
    Wojciechowski, Tomasz
    Rawski, Mariusz
    Tomaszewicz, Pawel
    PROCEEDINGS OF THE 2019 26TH INTERNATIONAL CONFERENCE MIXED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (MIXDES 2019), 2019, : 190 - 195
  • [40] Efficient Implementation of Masked AES on Side-Channel Attack Standard Evaluation Board
    Masoumi, Massoud
    Habibi, Pouya
    Jadidi, Mohammad
    INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2015), 2015, : 151 - 156