Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices

被引:0
|
作者
Medwed, Marcel [1 ]
Standaert, Francois-Xavier [2 ]
Grossschaedl, Johann [3 ]
Regazzoni, Francesco [2 ]
机构
[1] Graz Univ Technol, A-8010 Graz, Austria
[2] Catholic Univ Louvain, Louvain, Belgium
[3] Univ Luxembourg, Luxembourg, Luxembourg
来源
关键词
HIGHER-ORDER MASKING; POWER-ANALYSIS; AES; IMPLEMENTATIONS; RESISTANT; LEAKAGE;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-preserving applications. In this context, RFID tags need to be protected against physical attacks such as Differential Power Analysis (DPA) and fault attacks. The main obstacles towards secure RFID are the extreme constraints of passive tags in terms of power consumption and silicon area, which makes the integration of countermeasures against physical attacks even more difficult than for other types of embedded systems. In this paper we propose a fresh re-keying scheme that is especially suited for challenge-response protocols such as used to authenticate tags. We evaluate the resistance of our scheme against fault and side-channel analysis, and introduce a simple architecture for VLSI implementation. In addition, we estimate the cost of our scheme in terms of area and execution time for various security/performance trade-offs. Our experimental results show that the proposed re-keying scheme provides better security (and does so at less cost) than state-of-the-art countermeasures.
引用
收藏
页码:279 / +
页数:3
相关论文
共 50 条
  • [21] Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption A Case Study on Crystals-Kyber
    Ravi P.
    Paiva T.
    Jap D.
    D’anvers J.-P.
    Bhasin S.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (02): : 795 - 818
  • [22] Fast Side-Channel Security Evaluation of ECC Implementations Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder
    Azouaoui, Melissa
    Poussier, Romain
    Standaert, Francois-Xavier
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 25 - 42
  • [23] SCNIFFER: Low-Cost, Automated, Efficient Electromagnetic Side-Channel Sniffing
    Danial, Josef
    Das, Debayan
    Ghosh, Santosh
    Raychowdhury, Arijit
    Sen, Shreyas
    IEEE ACCESS, 2020, 8 : 173414 - 173427
  • [24] Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES
    Luo, Pei
    Fei, Yunsi
    Zhang, Liwei
    Ding, A. Adam
    2014 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG), 2014,
  • [25] Enhancing EMI-Packaging to Protect against Fault Injection and Side-Channel Attacks
    Avital, Moshe
    Weisman, Gil
    Moscovitz, Doron
    Levi, Itamar
    2024 IEEE INTERNATIONAL CONFERENCE ON MICROWAVES, COMMUNICATIONS, ANTENNAS, BIOMEDICAL ENGINEERING AND ELECTRONIC SYSTEMS, COMCAS 2024, 2024,
  • [26] Securing the PRESENT Block Cipher Against Combined Side-Channel Analysis and Fault Attacks
    De Cnudde, Thomas
    Nikova, Svetla
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2017, 25 (12) : 3291 - 3301
  • [27] Trade-offs in Protecting KECCAK Against Combined Side-Channel and Fault Attacks
    Purnal, Antoon
    Arribas, Victor
    De Meyer, Lauren
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 285 - 302
  • [28] Hardware/Software Cooperative Design Against Power Side-Channel Attacks on IoT Devices
    Yang, Mingyu
    Ahmed, Tanvir
    Inagaki, Saya
    Sakiyama, Kazuo
    Li, Yang
    Hara-Azumi, Yuko
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (09): : 16758 - 16768
  • [29] Verifying the Security of Enclaved Execution Against Interrupt-based Side-channel Attacks
    Piessens, Frank
    TIS'19: PROCEEDINGS OF ACM WORKSHOP ON THEORY OF IMPLEMENTATION SECURITY WORKSHOP, 2019, : 1 - 1
  • [30] Combinatorial logic circuitry as means to protect low cost devices against side channel attacks
    Vater, Rank
    Peter, Steffen
    Langendoerfer, Peter
    INFORMATION SECURITY THEORY AND PRACTICES: SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4462 : 244 - +