Secure implementation of cryptographic modules: Development of a standard evaluation environment for side channel attacks

被引:0
|
作者
Satoh, Akashi [1 ]
Katashita, Toshihiro [1 ]
Sakane, Hirofumi [1 ]
机构
[1] Research Center for Information Security, AIST, Akihabara Daibiru 1003, 1-18-13 Sotokanda, Chiyoda-ku 101-0021, Japan
来源
Synthesiology | 2010年 / 3卷 / 01期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
The use of cryptographic modules is rapidly expanding throughout the world. Because of this, it is necessary to standardize a security evaluation scheme and to establish a public evaluation and validation program for these modules. Side channel attacks, which extract secret information from the cryptographic module by analyzing power consumption and electromagnetic radiation, are attracting a lot of attention. Research activity on such attacks has intensified recently. However, it is difficult to compare evaluation schemes proposed by different researchers because of differences in the experimental platform or environment. This makes it difficult for other researchers to repeat and verify the results. Therefore, we have developed cryptographic hardware boards and analysis software to serve as a common, uniform evaluation platform for side channel attacks. We have distributed this platform to government, industry, and academic research labs throughout the world in order to facilitate the development of an international standard.
引用
收藏
页码:55 / 65
相关论文
共 50 条
  • [41] Secure compilation of side-channel countermeasures: the case of cryptographic "constant-time"
    Barthe, Gilles
    Gregoire, Benjamin
    Laporte, Vincent
    IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, : 328 - 343
  • [42] Empirical Evaluation of the Hypervisor Scheduling on Side Channel Attacks
    Liu, Li
    Wang, An
    Zang, Wanyu
    Yu, Meng
    Chen, Songqing
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [43] A secure and practical CRT-Based RSA to resist side channel attacks
    Kim, CK
    Ha, JC
    Kim, SH
    Kim, S
    Yen, SM
    Moon, SJ
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 150 - 158
  • [44] NEWCACHE: SECURE CACHE ARCHITECTURE THWARTING CACHE SIDE-CHANNEL ATTACKS
    Liu, Fangfei
    Wu, Hao
    Mai, Kenneth
    Lee, Ruby B.
    IEEE MICRO, 2016, 36 (05) : 8 - 16
  • [45] MEAS: memory encryption and authentication secure against side-channel attacks
    Unterluggauer, Thomas
    Werner, Mario
    Mangard, Stefan
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2019, 9 (02) : 137 - 158
  • [46] Memory architecture to mitigate side channel attacks for cryptographic application using loop cut technique
    Gupta, Aastha
    Sindal, Ravi
    Neema, Vaibhav
    MICROELECTRONICS JOURNAL, 2024, 152
  • [47] Secure and efficient elliptic curve cryptography resists side-channel attacks
    Zhang Tao~1
    2.School of Computer Science & Engineering
    3.School of Electronic Engineering
    Journal of Systems Engineering and Electronics, 2009, 20 (03) : 660 - 665
  • [48] Secure and efficient elliptic curve cryptography resists side-channel attacks
    Zhang Tao
    Fan Mingyu
    Zheng Xiaoyu
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2009, 20 (03) : 660 - 665
  • [49] Secure Broadcasting of Two Encrypted Sources under Side-Channel Attacks
    Santoso, Bagus
    Oohama, Yasutada
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 305 - 309
  • [50] Circuits and design techniques for secure ICs resistant to side-channel attacks
    Verbauwhede, I.
    Tiri, K.
    Hwang, D.
    Schaumont, P.
    2006 IEEE INTERNATIONAL CONFERENCE ON INTEGRATED CIRCUIT DESIGN AND TECHNOLOGY, PROCEEDINGS, 2006, : 57 - +