Security Evaluation of Cryptographic Modules against Side-Channel Attack using a Biased Data Set

被引:0
|
作者
Matsubayashi, Masato [1 ]
Guntur, Hendra [1 ]
Satoh, Akashi [1 ]
机构
[1] Univ Electrocommun, Dept Commun Engn & Informat, Chofu, Tokyo, Japan
关键词
side-channel attack; non-invasive attack; DPA; cryptographic circuit; ISO/IEC; 17825; SASEBO;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
ISO/IEC 17825 defines a methodology to evaluate the vulnerability of a cryptographic module against side-channel attacks. It calculates the correlation between internal data and power consumption or the electro-magnetic (EM) radiation of the module to assess the possibility of hidden information leakage thorough the physical power or EM signals. In order to improve the precision of the assessment, we introduced a biased data set to enhance the leakage signal. When the module is vulnerable to the attacks, our technique can reduce a number of power or EM waveforms required to detect the leakage by 10 times. This improvement was demonstrated through experiments using AES circuits implemented with side-channel attack countermeasures on ASIC chips.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] A Tolerant Algebraic Side-Channel Attack on AES Using CP
    Liu, Fanghui
    Cruz, Waldemar
    Ma, Chujiao
    Johnson, Greg
    Michel, Laurent
    PRINCIPLES AND PRACTICE OF CONSTRAINT PROGRAMMING (CP 2017), 2017, 10416 : 189 - 205
  • [42] Side-Channel Attack Using Meet-in-the-Middle Technique
    Kim, Jongsung
    Hong, Seokhie
    COMPUTER JOURNAL, 2010, 53 (07): : 934 - 938
  • [43] Reactive side-channel countermeasures: Applicability and quantitative security evaluation
    Agosta, Giovanni
    Barenghi, Alessandro
    Pelosi, Gerardo
    Scandale, Michele
    MICROPROCESSORS AND MICROSYSTEMS, 2018, 62 : 50 - 60
  • [44] Scan-Based Side-Channel Attack against RSA Cryptosystems Using Scan Signatures
    Nara, Ryuta
    Satoh, Kei
    Yanagisawa, Masao
    Ohtsuki, Tatsuo
    Togawa, Nozomu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (12) : 2481 - 2489
  • [45] Quantitative Evaluation of Side-channel Security for Elliptic Curve Cryptosystems
    Li, Huiyun
    Chen, Tingding
    Wu, Keke
    Yu, Fengqi
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 163 - 166
  • [46] Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks
    Luo, Pei
    Zhang, Liwei
    Fei, Yunsi
    Ding, A. Adam
    PROCEEDINGS OF THE ASAP2015 2015 IEEE 26TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, 2015, : 144 - 148
  • [47] Hardware Architecture Implemented on FPGA for Protecting Cryptographic Keys against Side-Channel Attacks
    Lumbiarres-Lopez, Ruben
    Lopez-Garcia, Mariano
    Canto-Navarro, Enrique
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) : 898 - 905
  • [48] Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC
    Almeida, Jose Bacelar
    Barbosa, Manuel
    Barthe, Gilles
    Dupressoir, Francois
    FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 163 - 184
  • [49] Side-channel AttacK User Reference Architecture Board SAKURA-W for Security Evaluation of IC Card
    Matsubayashi, Masato
    Satoh, Akashi
    2015 IEEE 4TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 2015, : 565 - 569
  • [50] An Analytic Attack against ARX Addition Exploiting Standard Side-channel Leakage
    Yan, Yan
    Oswald, Elisabeth
    Vivek, Srinivas
    ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 89 - 97