Tamper-resistant cryptographic hardware

被引:3
|
作者
Fujino, Takeshi [1 ]
Kubota, Takaya [2 ]
Shiozaki, Mitsuru [2 ]
机构
[1] Ritsumeikan Univ, Dept Sci & Engn, 1-1-1 Nojihigashi, Kusatsu, Shiga 5258577, Japan
[2] Ritsumeikan Univ, Res Org Sci & Engn, 1-1-1 Nojihigashi, Kusatsu, Shiga 5258577, Japan
来源
IEICE ELECTRONICS EXPRESS | 2017年 / 14卷 / 02期
基金
日本科学技术振兴机构;
关键词
security; cryptographic circuit; tamper resistance; side channel attack;
D O I
10.1587/elex.14.20162004
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cryptosystems are widely used for achieving data confidentiality and authenticated access control. Recent cryptographic algorithms such as AES or RSA are computationally safe in the sense that it is practically impossible to reveal key information from a pair of plain and cipher texts if a key of sufficient length is used. A malicious attacker aims to reveal a key by exploiting implementation flaws in cryptographic modules. Even if there are no flaws in the software, the attacker will try to extract a secret key stored in the security hardware. The side-channel attacks (SCAs) are low cost and powerful against cryptographic hardware. The attacker exploits side-channel information such as power or electro-magnetic emission traces on the cryptographic circuits. In this paper, we will introduce the principle of SCAs and the countermeasures against SCAs.
引用
收藏
页码:1 / 13
页数:13
相关论文
共 50 条
  • [31] Tamper-resistant storage techniques for multimedia systems
    Haubert, E
    Tucek, J
    Brumbaugh, L
    Yurcik, W
    [J]. Storage and Retrieval Methods and Applications for Multimedia 2005, 2005, 5682 : 30 - 40
  • [32] A Tamper-Resistant Authentication Scheme on Digital Image
    Liu, Guangqi
    Zheng, Xiaoshi
    Zhao, Yanling
    Li, Na
    [J]. PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 867 - 872
  • [33] CARMA: A Hardware Tamper-Resistant Isolated Execution Environment on Commodity x86 Platforms
    Vasudevan, Amit
    McCune, Jonathan
    Newsome, James
    Perrig, Adrian
    van Doorn, Leendert
    [J]. 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [34] PLASTIC MAGNET HOLDS TUMBLERS IN TAMPER-RESISTANT LOCK
    SODERHOL.L
    [J]. DESIGN NEWS, 1973, 28 (23) : 85 - 85
  • [35] StreamTo: Streaming content using a tamper-resistant token
    Cheng, JY
    Chong, CN
    Doumen, JM
    Etalle, S
    Hartel, PH
    Nikolaus, S
    [J]. SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 2005, 181 : 601 - 612
  • [36] Passive Design Technique for Tamper-Resistant Embedded System
    Anjum, Naveed
    Hammad, Saifullah
    Faheem, Muhammad
    [J]. PROCEEDINGS OF 2018 15TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2018, : 427 - 430
  • [38] FDA approves a more tamper-resistant formulation of OxyContin
    不详
    [J]. FORMULARY, 2010, 45 (05) : 166 - 167
  • [39] Tamper-Resistant Mobile Health Using Blockchain Technology
    Ichikawa, Daisuke
    Kashiyama, Makiko
    Ueno, Taro
    [J]. JMIR MHEALTH AND UHEALTH, 2017, 5 (07):
  • [40] A Tamper-Resistant Algorithm Using Blockchain for the Digital Tachograph
    Kim, Yongbae
    Back, Juyong
    Kim, Jongweon
    [J]. ELECTRONICS, 2021, 10 (05) : 1 - 19