Vulnerability modeling of cryptographic hardware to power analysis attacks

被引:7
|
作者
Moradi, Amir [1 ]
Salmasizadeh, Mahmoud [2 ]
Shalmani, Mohammad Taghi Manzuri [1 ]
Eisenbarth, Thomas [3 ]
机构
[1] Sharif Univ Technol, Dept Comp Engn, Tehran, Iran
[2] Sharif Univ Technol, Elect Res Ctr, Tehran, Iran
[3] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
基金
美国国家科学基金会;
关键词
SPA; DPA; Glitches; Toggle-count DPA; Vulnerability; SIDE-CHANNEL LEAKAGE; MASKING; FPGA;
D O I
10.1016/j.vlsi.2009.01.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Designers and manufacturers of cryptographic devices are always worried about the vulnerability of their implementations in the presence of power analysis attacks. This article can be categorized into two parts. In the first part, two parameters are proposed to improve the accuracy of the latest hypothetical power consumption model, so-called toggle-count model, which is used in power analysis attacks. Comparison between our proposed model and the toggle-count model demonstrates a great advance, i.e., 16%, in the similarity of hypothetical power values to the corresponding values obtained by an analog simulation. It is supposed that the attacker would be able to build such an accurate power model. Thus, in the second part of this article we aim at evaluating the vulnerability of implementations to power analysis attacks which make use of our proposed power model. Simple power analysis, various types of differential power analysis, and correlation power analysis are taken into account. Then, some techniques are proposed to examine the vulnerability of implementations to such kinds of power analysis attacks. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:468 / 478
页数:11
相关论文
共 50 条
  • [1] Power Current Modeling of Cryptographic VLSI Circuits for Analysis of Side Channel Attacks
    Nagata, Makoto
    Fujimoto, Daisuke
    Tanaka, Daichi
    [J]. 2013 ASIA-PACIFIC SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2013,
  • [2] Efficient Padding Oracle Attacks on Cryptographic Hardware
    Bardou, Romain
    Focardi, Riccardo
    Kawamoto, Yusuke
    Simionato, Lorenzo
    Steel, Graham
    Tsay, Joe-Kai
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 608 - 625
  • [3] Fault-based Attacks on Cryptographic Hardware
    Polian, Ilia
    Kreuzer, Martin
    [J]. PROCEEDINGS OF THE 2013 IEEE 16TH INTERNATIONAL SYMPOSIUM ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS & SYSTEMS (DDECS), 2013, : 12 - 17
  • [4] A Combinational Power Analysis Method against Cryptographic Hardware
    Guo Zheng
    Gu Dawu
    Lu Haining
    Liu Junrong
    Xu Sen
    Bao Sigang
    Gu Haihua
    [J]. CHINA COMMUNICATIONS, 2015, 12 (01) : 99 - 107
  • [5] Enhancing power analysis attacks against cryptographic devices
    Bucci, M.
    Giancane, L.
    Luzzi, R.
    Marino, M.
    Scotti, G.
    Trifiletti, A.
    [J]. IET CIRCUITS DEVICES & SYSTEMS, 2008, 2 (03) : 298 - 305
  • [6] A Combinational Power Analysis Method against Cryptographic Hardware
    GUO Zheng
    GU Dawu
    LU Haining
    LIU Junrong
    XU Sen
    BAO Sigang
    GU Haihua
    [J]. China Communications, 2015, (01) : 99 - 107
  • [7] A Combinational Power Analysis Method against Cryptographic Hardware
    GUO Zheng
    GU Dawu
    LU Haining
    LIU Junrong
    XU Sen
    BAO Sigang
    GU Haihua
    [J]. 中国通信., 2015, 12 (01) - 107
  • [8] Patents in power analysis attacks and their countermeasures for cryptographic devices
    Muresan, Radu
    [J]. Recent Patents on Electrical Engineering, 2010, 3 (03) : 177 - 185
  • [9] Enhancing power analysis attacks against cryptographic devices
    Bucci, M.
    Giancane, L.
    Luzzi, R.
    Scotti, G.
    Trifiletti, A.
    [J]. 2006 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, PROCEEDINGS, 2006, : 2905 - 2908
  • [10] Leakage Power Analysis Attacks: A Novel Class of Attacks to Nanometer Cryptographic Circuits
    Alioto, Massimo
    Giancane, Luca
    Scotti, Giuseppe
    Trifiletti, Alessandro
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2010, 57 (02) : 355 - 367