Hiding Side-channel Leakage through Hardware Randomization: a Comprehensive Overview

被引:0
|
作者
Mentens, Nele [1 ]
机构
[1] Katholieke Univ Leuven, IMEC, COSIC, Kasteelpark Arenberg 10, B-3001 Leuven, Belgium
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper gives (i) an overview of the reconfiguration capabilities of modern hardware devices and (ii) a summary and comparison of hardware architectures that use random reconfiguration as a countermeasure against side-channel attacks. We categorize the architectures according to their suitability for specic hardware platforms. Further, we compare the reconfiguration methods and the attacks that the countermeasures protect against. Although the presented randomization countermeasures can usually be applied to a broad range of algorithms, evaluation results are presented for specific cryptographic algorithms. In most cases, randomization countermeasures can be combined with other countermeasures that are tailored to specific algorithms.
引用
下载
收藏
页码:269 / 272
页数:4
相关论文
共 50 条
  • [1] Hiding Higher-Order Side-Channel Leakage Randomizing Cryptographic Implementations in Reconfigurable Hardware
    Sasdrich, Pascal
    Moradi, Amir
    Gueneysu, Tim
    TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 131 - 146
  • [2] Pinpointing the side-channel leakage of masked AES hardware implementations
    Mangard, Stefan
    Schramm, Kai
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 76 - 90
  • [3] A comprehensive side-channel leakage assessment of CRYSTALS-Kyber in IIoT
    Huang, Zitian
    Wang, Huanyu
    Cao, Bijia
    He, Dalin
    Wang, Junnian
    INTERNET OF THINGS, 2024, 27
  • [4] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [5] Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES
    Brisfors, Martin
    Moraitis, Michail
    Dubrova, Elena
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2022, 2023, 13877 : 38 - 53
  • [6] Testing Cache Side-channel Leakage
    Basu, Tiyash
    Chattopadhyay, Sudipta
    10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS - ICSTW 2017, 2017, : 51 - 60
  • [7] A Survey of Side-Channel Leakage Assessment
    Wang, Yaru
    Tang, Ming
    ELECTRONICS, 2023, 12 (16)
  • [8] Side-Channel Leakage across Borders
    Schmidt, Joern-Marc
    Plos, Thomas
    Kirschbaum, Mario
    Hutter, Michael
    Medwed, Marcel
    Herbst, Christoph
    SMART CARD RESEARCH AND ADVANCED APPLICATION, PROCEEDINGS, 2010, 6035 : 36 - 48
  • [9] Side-channel leakage tolerant architectures
    Tiri, Kris
    Schaumont, Patrick
    Verbauwhede, Ingrid
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 204 - +
  • [10] Mitigating Cache-Based Side-Channel Attacks through Randomization: A Comprehensive System and Architecture Level Analysis
    Wang, Han
    Sayadi, Hossein
    Mohsenin, Tinoosh
    Zhao, Liang
    Sasan, Avesta
    Rafatirad, Setareh
    Homayoun, Houman
    PROCEEDINGS OF THE 2020 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2020), 2020, : 1414 - 1419