Research on Power Analysis Against Software-based and Hardware-based Cryptographic Circuits

被引:0
|
作者
Sun, Wei [1 ]
Liu, Jun-Rong [1 ]
Gu, Da-Wu [1 ]
Guo, Zheng [1 ]
Xie, Jun [1 ]
Ma, Bo [2 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai 200240, Peoples R China
[2] Shanghai Huahong Integrated Circuit Co Ltd, Shanghai 200240, Peoples R China
关键词
Cryptographic circuits; Side channel attacks; Power analysis; SM3-HMAC;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Nowadays, cryptographic circuits have been widely used in many fields such as finance, transportation and government business. Such devices have software and hardware implementations, as they both have certain weakness and constraints. In this paper, we research on both software and hardware cryptographic circuits based on the side channel technology. By using different power leakage models, we can point out the weakness operations of a cryptographic circuit that leaks secret information. Furthermore, we research on the differences between software and hardware implementations of SM3-HMAC, and propose power analysis methods respectively.
引用
收藏
页码:10 / 18
页数:9
相关论文
共 50 条
  • [1] A Review on Software-Based and Hardware-Based Authentication Mechanisms for the Internet of Drones
    Michailidis, Emmanouel T.
    Vouyioukas, Demosthenes
    DRONES, 2022, 6 (02)
  • [2] A taxonomy of software-based and hardware-based approaches for energy efficiency management in the Hadoop
    Shabestari, Fatemeh
    Rahmani, Amir Masoud
    Navimipour, Nima Jafari
    Jabbehdari, Sam
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 126 : 162 - 177
  • [3] Implementation of Hardware-Based Expert Systems and Comparison of Their Performance to Software-Based Expert Systems
    Ritter, Noah
    Straub, Jeremy
    MACHINES, 2021, 9 (12)
  • [5] Evaluating the reliability of a GPU pipeline to SEU and the impacts of software-based and hardware-based fault tolerance techniques
    Goncalves, Marcio
    Saquetti, Mateus
    Azambuja, Jose Rodrigo
    MICROELECTRONICS RELIABILITY, 2018, 88-90 : 931 - 935
  • [6] Hardware Acceleration of a Software-based VPN
    Turan, Furkan
    de Clercq, Ruan
    Maene, Pieter
    Reparaz, Oscar
    Verbauwhede, Ingrid
    2016 26TH INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS (FPL), 2016,
  • [7] Hardware-Based Attacks to Compromise the Cryptographic Security of an Election System
    Bidmeshki, Mohammad-Mahdi
    Reddy, Gaurav Rajavendra
    Zhou, Liwei
    Rajendran, Jeyavijayan
    Makris, Yiorgos
    PROCEEDINGS OF THE 34TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2016, : 153 - 156
  • [8] Investigation and Design of the Efficient Hardware-based RNG for Cryptographic Applications
    Razy, Ahmad Firdaus Mohamad
    Naziri, Siti Zarina Md
    Ismail, Rizalafande Che
    Idris, Norina
    2014 2ND INTERNATIONAL CONFERENCE ON ELECTRONIC DESIGN (ICED), 2014, : 255 - 260
  • [9] Research on hardware-based genetic algorithms
    Zhong, Guo-An
    Jin, Dong-Ming
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2000, 28 (11): : 72 - 76
  • [10] A Combinational Power Analysis Method against Cryptographic Hardware
    Guo Zheng
    Gu Dawu
    Lu Haining
    Liu Junrong
    Xu Sen
    Bao Sigang
    Gu Haihua
    CHINA COMMUNICATIONS, 2015, 12 (01) : 99 - 107