Research on Power Analysis Against Software-based and Hardware-based Cryptographic Circuits

被引:0
|
作者
Sun, Wei [1 ]
Liu, Jun-Rong [1 ]
Gu, Da-Wu [1 ]
Guo, Zheng [1 ]
Xie, Jun [1 ]
Ma, Bo [2 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai 200240, Peoples R China
[2] Shanghai Huahong Integrated Circuit Co Ltd, Shanghai 200240, Peoples R China
关键词
Cryptographic circuits; Side channel attacks; Power analysis; SM3-HMAC;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Nowadays, cryptographic circuits have been widely used in many fields such as finance, transportation and government business. Such devices have software and hardware implementations, as they both have certain weakness and constraints. In this paper, we research on both software and hardware cryptographic circuits based on the side channel technology. By using different power leakage models, we can point out the weakness operations of a cryptographic circuit that leaks secret information. Furthermore, we research on the differences between software and hardware implementations of SM3-HMAC, and propose power analysis methods respectively.
引用
收藏
页码:10 / 18
页数:9
相关论文
共 50 条
  • [21] Hardware- and software-based collective communication on the Quadrics network
    Petrini, F
    Coll, S
    Frachtenberg, E
    Hoisie, A
    IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2001, : 24 - 35
  • [22] A Software-Based Solution for Research in Space Ethology
    Tafforin, Carole
    Gerebtzoff, Dimitri
    AVIATION SPACE AND ENVIRONMENTAL MEDICINE, 2010, 81 (10): : 951 - 956
  • [23] Defending Hardware-Based Malware Detectors Against Adversarial Attacks
    Kuruvila, Abraham Peedikayil
    Kundu, Shamik
    Basu, Kanad
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 40 (09) : 1727 - 1739
  • [24] A Test Automation of a full Software Stack on Virtual Hardware-based Simulator
    Lee, Jae-ho
    Kim, Sunja
    Ryu, Cheol
    Kim, Dohyeng
    Lee, Cheol-Hoon
    ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 37 - +
  • [25] Virtualization and hardware-based security
    Perez, Ronald
    Sailer, Reiner
    van Doorn, Leendert
    IEEE SECURITY & PRIVACY, 2008, 6 (05) : 24 - 31
  • [26] Hardware-based power management for real-time applications
    Uhrig, S
    Ungerer, T
    SECOND INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED COMPUTING, PROCEEDINGS, 2003, : 258 - 265
  • [27] Hardware-based Cyber Threats
    Alves, Thiago
    Morris, Thomas
    ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 259 - 266
  • [28] Remotizing and Virtualizing Chips and Circuits for Hardware-based Capture-the-Flag Challenges
    Roascio, Gianluca
    Cerini, Samuele Yves
    Prinetto, Paolo
    7TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2022), 2022, : 477 - 485
  • [29] HAPMAD: Hardware-Based Authentication Platform for Malicious Activity Detection in Digital Circuits
    Koneru, Venkata Raja Ramchandar
    Teja, Bikki Krishna
    Reddy, Kallam Dinesh Babu
    GnanaSwaroop, Makam V.
    Ramanidharan, Bharath
    Mohankumar, N.
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, INDIA 2017, 2018, 672 : 608 - 617
  • [30] The Design and Analysis of a Hardware-based Anomaly Detection Scheme
    Piao, JinLong
    Kim, Seong Baeg
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 367 - 372