IS THE DIFFERENTIAL FREQUENCY-BASED ATTACK EFFECTIVE AGAINST RANDOM DELAY INSERTION?

被引:0
|
作者
Lu, Y. [1 ]
Boey, K. H. [1 ]
O'Neill, M. [1 ]
McCanny, J. V. [1 ]
Satoh, A. [2 ]
机构
[1] Queens Univ Belfast, ECIT, Belfast BT3 9DT, Antrim, North Ireland
[2] Natl Inst Adv Ind Sci & Technol, Tsukuba, Ibaraki, Japan
来源
SIPS: 2009 IEEE WORKSHOP ON SIGNAL PROCESSING SYSTEMS | 2009年
基金
英国工程与自然科学研究理事会;
关键词
Advanced Encryption Standard; Countermeasure; Differential Frequency-based Attack; Differential Power Analysis; Random Delay Insertion;
D O I
10.1145/1629435.1629443
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The secret key stored in a cryptographic device can be revealed from the power consumption using statistical analysis in a technique known as Differential Power Analysis (DPA). However, DPA attacks are sensitive to measurement misalignments in the power samples that reduce the dependency between the power and the data. A countermeasure technique that increases this misalignment by inserting random delays between operations, known as Random Delay Insertion, was shown in previous research to be effective against DPA on hardware implementations. A Differential Frequency-based Attack (DFBA) is a DPA technique that involves a frequency-based preprocessing step and it can be utilized to attack security implementations that include misalignments. In this research, a DFBA attack is carried out on an AES algorithm implemented on both ASIC and FPGA devices. The results indicate that the length of delay which the DFBA attack can reduce is limited. Therefore, the RDI countermeasure is effective against DFBA when the inserted delay is larger than the effective DFBA window size.
引用
收藏
页码:51 / +
页数:2
相关论文
共 50 条
  • [31] Frequency-based optimization design for fractional delay FIR filters with software-defined radio applications
    Electronics Department, Technological Institute of Celaya, Celaya, GTO 38010, Mexico
    不详
    Int. J. Digit. Multimedia Broadcast.,
  • [32] A Triggered Delay-based Approach against Cache Privacy Attack in NDN
    Naveen Kumar
    Ashutosh Kumar Singh
    Shashank Srivastava
    International Journal of Networked and Distributed Computing, 2018, 6 (3) : 174 - 184
  • [33] A Triggered Delay-based Approach against Cache Privacy Attack in NDN
    Kumar, Naveen
    Singh, Ashutosh Kumar
    Srivastava, Shashank
    INTERNATIONAL JOURNAL OF NETWORKED AND DISTRIBUTED COMPUTING, 2018, 6 (03) : 174 - 184
  • [34] Protective effect of crocin against the declining of high spatial frequency-based visual performance in mice
    Liou, Jyh-Cheng
    Yang, Shih-Liang
    Wang, Ping-Hsun
    Wu, Jia-Lain
    Huang, Yun-Ping
    Chen, Bo-Yie
    Lee, Meng-Chih
    JOURNAL OF FUNCTIONAL FOODS, 2018, 49 : 314 - 323
  • [35] Effective defense against fingerprinting attack based on autocorrelation property minimization approach
    Jahani, Hojjat
    Jalili, Saeed
    JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2020, 54 (02) : 341 - 362
  • [36] Effective defense against fingerprinting attack based on autocorrelation property minimization approach
    Hojjat Jahani
    Saeed Jalili
    Journal of Intelligent Information Systems, 2020, 54 : 341 - 362
  • [37] A new method for resisting collision attack based on parallel random delay S-box
    Zhou, Fang
    Wu, Ning
    Zhang, Xiaoqiang
    Zhang, Jinbao
    IEICE ELECTRONICS EXPRESS, 2019, 16 (11): : 1 - 5
  • [38] Robust Load Frequency Control of Power Systems Against Random Time-Delay Attacks
    Xiahou, K. S.
    Liu, Y.
    Wu, Q. H.
    IEEE TRANSACTIONS ON SMART GRID, 2021, 12 (01) : 909 - 911
  • [39] A Frequency Band Phase Calibration Method Based on Differential Group Delay
    Liu, Jie
    Cai, Jinyao
    2ND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY, CII 2017, 2017, : 515 - 522
  • [40] A Differential Game Based Approach Against Objective Function Attack in Cognitive Networks
    Feng Guangsheng
    Lin Junyu
    Zhao Qian
    Wang Huiqiang
    Lyu Hongwu
    Zhao Xiaoyu
    Han Jizhong
    Li Bingyang
    CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (04) : 879 - 888