Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices

被引:0
|
作者
Medwed, Marcel [1 ]
Standaert, Francois-Xavier [2 ]
Grossschaedl, Johann [3 ]
Regazzoni, Francesco [2 ]
机构
[1] Graz Univ Technol, A-8010 Graz, Austria
[2] Catholic Univ Louvain, Louvain, Belgium
[3] Univ Luxembourg, Luxembourg, Luxembourg
来源
关键词
HIGHER-ORDER MASKING; POWER-ANALYSIS; AES; IMPLEMENTATIONS; RESISTANT; LEAKAGE;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-preserving applications. In this context, RFID tags need to be protected against physical attacks such as Differential Power Analysis (DPA) and fault attacks. The main obstacles towards secure RFID are the extreme constraints of passive tags in terms of power consumption and silicon area, which makes the integration of countermeasures against physical attacks even more difficult than for other types of embedded systems. In this paper we propose a fresh re-keying scheme that is especially suited for challenge-response protocols such as used to authenticate tags. We evaluate the resistance of our scheme against fault and side-channel analysis, and introduce a simple architecture for VLSI implementation. In addition, we estimate the cost of our scheme in terms of area and execution time for various security/performance trade-offs. Our experimental results show that the proposed re-keying scheme provides better security (and does so at less cost) than state-of-the-art countermeasures.
引用
收藏
页码:279 / +
页数:3
相关论文
共 50 条
  • [41] Security Simulation against Side-Channel Attacks on Advanced Encryption Standard Circuits Based on Equivalent Circuit Model
    Iokibe, Kengo
    Maeshima, Kazuhiro
    Watanabe, Tetsushi
    Toyota, Yoshitaka
    2015 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC), 2015, : 224 - 229
  • [42] Secure AI for 6G Mobile Devices: Deep Learning Optimization Against Side-Channel Attacks
    Ahmed, Amjed Abbas
    Hasan, Mohammad Kamrul
    Memon, Imran
    Aman, Azana Hafizah Mohd
    Islam, Shayla
    Gadekallu, Thippa Reddy
    Memon, Sufyan Ali
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 3951 - 3959
  • [43] A Low-cost Function Call Protection Mechanism Against Instruction Skip Fault Attacks
    Yao, Yuan
    Schaumont, Patrick
    PROCEEDINGS OF THE 2018 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY (ASHES'18), 2018, : 55 - 64
  • [44] Security and privacy in an IT context a low-cost WIDS employed against MITM attacks (concept)
    Poljak, N.
    Sevo, M.
    Livaja, I.
    2016 39TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2016, : 1614 - 1617
  • [45] The Low Cost Threshold Implementation Method of uBlock Algorithm Against Side Channel Attacks
    Jiao Z.-P.
    Chen H.
    Yao F.
    Fan L.-M.
    Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (03): : 657 - 670
  • [46] Signal-to-Noise Ratio Measurements of Side-Channel Traces for Establishing Low-Cost Countermeasure Design
    Yano, Yusuke
    Iokibe, Kengo
    Toyota, Yoshitaka
    Teshima, Toshiaki
    2017 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2017, : 93 - 95
  • [47] Design and Evaluation of Countermeasures Against Fault Injection Attacks and Power Side-Channel Leakage Exploration for AES Block Cipher
    POTESTAD-ORDONEZ, F. E.
    TENA-SANCHEZ, E.
    ACOSTA-JIMENEZ, A. J.
    JIMENEZ-FERNANDEZ, C. J.
    CHAVES, R. I. C. A. R. D. O.
    IEEE ACCESS, 2022, 10 : 65548 - 65561
  • [48] A Low-overhead Solution for Obfuscating Scan Data Against Scan-based Side-channel Attacks
    Zheng, Xiong
    Ning, Zuoting
    Wang, Weizheng
    Peng, Yan
    JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, 2021, 21 (04) : 247 - 254
  • [49] Orthogonal Direct Sum Masking A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks
    Bringer, Julien
    Carlet, Claude
    Chabanne, Herve
    Guilley, Sylvain
    Maghrebi, Houssem
    INFORMATION SECURITY THEORY AND PRACTICE: SECURING THE INTERNET OF THINGS, 2014, 8501 : 40 - 56
  • [50] Formal Analysis of the Entropy/Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks
    Nassar, Maxime
    Guilley, Sylvain
    Danger, Jean-Luc
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2011, 2011, 7107 : 22 - +