Vulnerability modeling of cryptographic hardware to power analysis attacks

被引:7
|
作者
Moradi, Amir [1 ]
Salmasizadeh, Mahmoud [2 ]
Shalmani, Mohammad Taghi Manzuri [1 ]
Eisenbarth, Thomas [3 ]
机构
[1] Sharif Univ Technol, Dept Comp Engn, Tehran, Iran
[2] Sharif Univ Technol, Elect Res Ctr, Tehran, Iran
[3] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
基金
美国国家科学基金会;
关键词
SPA; DPA; Glitches; Toggle-count DPA; Vulnerability; SIDE-CHANNEL LEAKAGE; MASKING; FPGA;
D O I
10.1016/j.vlsi.2009.01.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Designers and manufacturers of cryptographic devices are always worried about the vulnerability of their implementations in the presence of power analysis attacks. This article can be categorized into two parts. In the first part, two parameters are proposed to improve the accuracy of the latest hypothetical power consumption model, so-called toggle-count model, which is used in power analysis attacks. Comparison between our proposed model and the toggle-count model demonstrates a great advance, i.e., 16%, in the similarity of hypothetical power values to the corresponding values obtained by an analog simulation. It is supposed that the attacker would be able to build such an accurate power model. Thus, in the second part of this article we aim at evaluating the vulnerability of implementations to power analysis attacks which make use of our proposed power model. Simple power analysis, various types of differential power analysis, and correlation power analysis are taken into account. Then, some techniques are proposed to examine the vulnerability of implementations to such kinds of power analysis attacks. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:468 / 478
页数:11
相关论文
共 50 条
  • [41] A novel SM4 cryptographic architecture against higher order power analysis attacks
    Sun, Nengyuan
    Liu, Wenrui
    Cheng, Jiafeng
    Peng, Zhaokang
    Wang, Chunyang
    Sun, Caiban
    Sha, Heng
    Pan, Zhiyuan
    Jin, Ming
    Zhao, Hongyang
    Wang, Jinghe
    Wen, Yiming
    Kong, Pengliang
    Zhao, Yunfeng
    Wang, Yaoqiang
    Kose, Selcuk
    Yu, Weize
    [J]. INTERNATIONAL JOURNAL OF CIRCUIT THEORY AND APPLICATIONS, 2024, 52 (08) : 4184 - 4198
  • [42] Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks
    Luo, Pei
    Zhang, Liwei
    Fei, Yunsi
    Ding, A. Adam
    [J]. PROCEEDINGS OF THE ASAP2015 2015 IEEE 26TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, 2015, : 144 - 148
  • [43] Gate-Level Hardware Countermeasure Comparison against Power Analysis Attacks
    Tena-Sanchez, Erica
    Potestad-Ordonez, Francisco Eugenio
    Jimenez-Fernandez, Carlos J.
    Acosta, Antonio J.
    Chaves, Ricardo
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (05):
  • [44] Nodal vulnerability to targeted attacks in power grids
    Cetinay H.
    Devriendt K.
    Van Mieghem P.
    [J]. Applied Network Science, 2018, 3 (01)
  • [45] Uncertainty Analysis in Cryptographic Key Recovery for Machine Learning-Based Power Measurements Attacks
    Arpaia, Pasquale
    Caputo, Francesco
    Cioffi, Antonella
    Esposito, Antonio
    Isgro, Francesco
    [J]. IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2023, 72
  • [46] TVVF: Estimating the Vulnerability of Hardware Cryptosystems against Timing Violation Attacks
    Yuce, Bilgiday
    Ghalaty, Nahid Farhady
    Schaumont, Patrick
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2015, : 72 - 77
  • [47] Embedded cryptographic hardware
    Nedjah, Nadia
    Mourelle, Luiza de Macedo
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2007, 53 (2-3) : 69 - 71
  • [48] Embedded cryptographic hardware
    Nedjah, Nadia
    Mourelle, Luiza de Macedo
    [J]. INTEGRATION-THE VLSI JOURNAL, 2007, 40 (01) : 1 - 2
  • [49] Vulnerability analysis and critical areas identification of the power systems under terrorist attacks
    Wang, Shuliang
    Zhang, Jianhua
    Zhao, Mingwei
    Min, Xu
    [J]. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2017, 473 : 156 - 165
  • [50] Reproducibility Enhancement by Optimized Power Analysis Attacks in Vulnerability Assessment of IoT Transducers
    Arpaia, Pasquale
    Bonavolonta, Francesco
    Cioffi, Antonella
    Moccaldi, Nicola
    [J]. IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2021, 70